Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 18:01
Static task
static1
Behavioral task
behavioral1
Sample
dmmiedit.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dmmiedit.html
Resource
win10v2004-20240704-en
General
-
Target
dmmiedit.html
-
Size
167KB
-
MD5
7e13719b5732fa63732704319fabe24d
-
SHA1
c3c2aee2827b607b3efa88068c8b268290767e73
-
SHA256
b312d50a2871261368e9e3d9169a2a520cda52f9f38e976b76e3e152addd757e
-
SHA512
d77a23b06c6e6d88348ae4f1a499c3d7981af5dc6e5b5e108a25c392812bed484d2c962df8b925458ba7120e48e216a4d03a65fe4a36bafddf39319d07f232f0
-
SSDEEP
1536:HKZlxAe1LH9H7zEFGLY9oPa7dbv1FJNPnFJU6IvnbEcm3XBiWpyZ74Q62tTIiAzN:HKZlr1LH9HKJupx+FB
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a03db8cecfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000810ade3759d4d4fa445860244ba0ce1b20ebdd65446ceed36fea66b0b2fffdd9000000000e8000000002000020000000acbf401620103eb84e9b6f6eb3186e3725079a06ff0ea98f3b43304114beebf520000000ec7624b9151a73fcd1b21b058fec27283d8243fbdf87b2805fbef4fc04b5bc6840000000a52a928718e1d3a74154139c83cbd6acb29b3919af23b1db2e1ceb0fcd476c7b19bb9f9d44f50232a3d1391a9b540d730ecda94bd13770b32819763b4204d84b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426450807" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E37FB8A1-3BC1-11EF-A87C-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2720 2692 iexplore.exe 31 PID 2692 wrote to memory of 2720 2692 iexplore.exe 31 PID 2692 wrote to memory of 2720 2692 iexplore.exe 31 PID 2692 wrote to memory of 2720 2692 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dmmiedit.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff5a58420bed8a688690145917c543e7
SHA1698e35b0282a9d21b073cee678c8baad4a933902
SHA256b733ffe41ad8750508a0ac4763e5096d13186cee006961a531b0234f14eb0a53
SHA51291afc8781fd11fc446214d555b71f1fd11fb00bd5b8168e640b6f3ef1b89f511dd22bb604bcd598a8d0bcf7c062f3a67300169d05663a41f843140c10d3ef1cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54969c2ec7abf83d7b427fc01d15271f5
SHA12f7d5ceabe56925a7d9415d7cd541f9cd52c5f1d
SHA256f9253642c7e218f6b0077be28aa6bffce126d68725a7abbf006060eb45f836bf
SHA51212771234819bde51a4765bb1e1858a94e6ad671fef5afdc8365c6c8b3c7051c174d2c18197163406ddbcfba3682becab934522ffa7f002ccc1dceb297dc5cfb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53e661b122c8c864d2bcb3c845aed1e1c
SHA1c1082f42a568a395c7b23963723408670194c721
SHA25692820fbbdfdfac20bc378f06fb33c994b0175a7847606d4a682256ef0497be17
SHA5129b1af969da367a0f5ddd23a960b7b49680be651ed49eb7e16a62dc0cd214668d7b15f4561a5f388732c63f9a1bd0172bfe82e635be5a372562ba0baf136962c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59adbb9aec0bc7ace4e507a4d73e6469b
SHA18c430be60549688d79410ab2c06e678ae74d156a
SHA2563eeca05d0f452f23cbc47aa40332b73647dbf0782dc7a4662770be2b643d8177
SHA512b68dd9f0a861c418be35d77538b8bdbac22fd6360dfa7daec7b8127c41760da22801caab2c9222ada87af83021e7ab433b89ea0b1ab34d30713f2ec679100e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD581ef903b025230141154ea133b69ff10
SHA13ef83ab9e89c8ec7ea8e3fdec4f6f8758ec83fed
SHA256c102482713d4803b96f38f112d61e70c96e906a9d63a475af2d4e7124079d5c2
SHA5128df065058e24ad51b5ffa4aebe8191fde696293aa3b4e717370e483a07a39f842ba96affed66f2018dce23858b1bc084e02e6288fb6adf530a638114b9e08d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51107829d1b084990e23df8327cc82033
SHA10cb79c744377d178080c21e0f01cb7f3ba0bf051
SHA256c322c7475a805f4024aef80fdc4f7410e4bd2a5f9e20dccbb56cc55a2aa1e4e9
SHA5129e31fd28b19a2144a082a40485c60fd28dd22dec20ae386a2bdb0759149bd8638d85f755040980de2e73ea5df80d71bd4a613d11b3d71b054a1b69bb84b6d8ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5408b8d5c165f6a20774649532ce7562a
SHA167e69970a6b13af2e06f0b64911cd01863c5e10a
SHA256c300527657e6db723268363ff7d6ea5713b61c387f20ac929b80fd212275193a
SHA5122f9574d9f0f1977eee18e7ee8688c42a5c7759ed21bfe547009ec64d4609ce19fa67cd0224dc593fda18952eb40ff1d66416ddabdde4fac3cc5175784006fa9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bcc5926a81fe96a6d4d5cf25dba28c5b
SHA1592b9cf2486bc3ee8149a32f4c90de31c5736a8b
SHA256781d7576d4c2618e955b88d84d91364e62ae50df5bb1f1cf654986e25d6c7042
SHA512e4cdc3e03fcb6fac8e64be11778371cbe47ae7cc49d018013bed95b2cb758116f59e349b8f505f6882ac91f0c7d122f5428915134613248dad09bb5da6df53b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5efe0689b648245fd93bf8e19317e03f8
SHA1c509b49a5befd8e219aa19593b6db781d235a9b8
SHA256cfa58bde9aa7fef2b405754e932a99f0c99b25f965acf2eeb011190fef9d615c
SHA51251d4dac4473bf88840ed5f98caecccbe37e400288a6fe74d2aa690cd30ee9127e83a07765af285317a4df9a1d1a414f29a55a719688fdc09273b37b1508fa21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a511bb3aa5a2997e5633d0fe9e0b4049
SHA19ffe10e3abecc7ba1ab57cfa8d7a71a19562920b
SHA2565c35bc8b876dca9811b8a59f3fa3e2ba7b2fb271e65445b806b12d29b8aed343
SHA51289c74527d4c909911125e6e9baed6fd58e23041c586544119dfcaa8d3fdfbdb0e5250cd58374ab2f7ffb4a05e49ba8c4f8fa30aa2de33c43a68bea3a33893bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b6697a72e47a74383928f89b24b004f9
SHA10879af00063d3e2e712984edc059e070518cb545
SHA2564600dffdaef8a5d0006eecc3c386f4129500d9a7d98bc5c4998a3f7910d457ff
SHA512157e2d9aab6e68a595b30871d9941382cc8da147d072719162d25dcad786baa06904b48947611702fbf69e014c83dc2af8520a9022849b73fab0aec6e2908da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa40716d1591923140c0a7658360aae5
SHA11f3551e579e13097fc9b5cb02e0f5a14aa79a514
SHA25655238e265e3166a2e80cf92a7f0f2f2a8220bdb3d03734d06b7d0e58f5490df1
SHA51229a79b4a7c791f2881e659f89ea146ba69159fbae7236908eb93b6ba147f74d24a90498c67af12d3bd0f969a35985779392d958c870ead3a572e378d8bbc35aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5486289e34ee1bcf58d79ff51065966f1
SHA1f2d97a4948fb9172e0dd92a2ac4efa4db0a2bc64
SHA2567e337e26a66baa404ab25ee4c9174d0f9a0bd2287cd4411d982f0b1ce1e3851f
SHA512096e8c2f1540639e971cde80595e2a9bb1c0d9fc6497934cae0513fedd578d10c1c37a059a355ee4e2e04b298be6786cb4910592a5c22b1b6982b23fea323db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56c7a92d81dd0127f37f94d87f7609beb
SHA1fc71be57bf99128c13f968bad09e77a608ec5a8a
SHA2561cc94e3773aa5714f148b4e6ea4c40755a7595bb2e7402612f7161015ee9092b
SHA5125f47810c4c660a1cfe0e85e8c9a561eb5161ad326927c226b386b55cf2edc25ed100764870037b79dd54b94829cb4cb76274e311e35988c7480189be0971e926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b66ec1e0c14dd14b5e399a80bb811534
SHA1305b1e96eafa08afe53b54267fba1db8fb26ee57
SHA256902637474c1d5d376e4377abdb240ec8a605fb4cbf14a498bb59d797503b4909
SHA5128e4efed4c912991701fd17b81e9dc04c8307980328c08d9066afb9a875bb85e1f762e592a97edaa97758e81a28f377afa1c810c74a18faa878f8245b99e1fee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51f102e6166e9852d1dc4931a981050fc
SHA1e4349c387af6645998fe55b43f42aa340cb56420
SHA2560bce36ba9bbae34d821341515adc0155eac87f70714e843126fa8cc7c135d4f6
SHA512d56e2fbbbb51363acd94de04ca5786c722b5b9ed9d4725457797892ab655902f7e604256ff98d45ea9f7f61f7f8c6e73e62e4ba5ca24acc8372d6fdb8dd01396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52f0014e55a543c9657a5da1b365c3afe
SHA1b0ce74f67d8d92c0fbb1793b1715379153938c84
SHA2561e9de7eaab2b5a40143c19048701470b3b9ea79fa1ebabeb7e7e8432cb91b27e
SHA5123e201092cbb84a8391e658100d02d522ca1c5a06cb6ffb62b8abde358a3d2e632f52aec1f482dfca0698f0b3874cd03a68f6577d22edf2f80f8c384b213a6ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d2e928cfc59cd4115c4f313f998ac574
SHA14ff820af246ab6e8fa2d379a37bb1bc818726b6a
SHA2562adea76942fd36f7fc16e649fc504865e268a1d65c449595047fe6b96942ab21
SHA512451bc8a46f44c2b685c32d8c15644fa0f6d7a230d7637b811cf725ffaceaf081f4b55ad5478684876dc1f0a0a7ec7faf8d51640c7694da5a70925c80c73e78b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5224839204a7fcefdfa682f0688770cf3
SHA12613c7051c2f197d1ceabef86f702318205fb6e6
SHA256a8e8e74b6135502bca3a65f371ffd827e1d38a60a615098c50deb758086563b0
SHA512c2897a083919a442b271331a31f05b4e4da9fdbef3cd026650710a95b9f9523146655f00932d3cfa0414456529ef0ec98542a54f9f55c43a6d9cc5047cad1d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD559daec52d76d71d8cfddbdd08e78d156
SHA14cf2c2f14754b2526a3cff075f25765e28fdb944
SHA25682e7f5a1eb36af41de19e33366879af40e957b83bb404cdcef76466a2b7f70b5
SHA5126574faa45f8a69df4cc97435c71619801a07b0c6128397b9207e09d8070b10ec01bb5f066ecda7f10ac31a321e1f03d841ec95601195da41533e779362bdd984
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b