Analysis
-
max time kernel
31s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 21:12
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
file.html
Resource
win10v2004-20240704-en
General
-
Target
file.html
-
Size
15KB
-
MD5
846eb862da864b126a537ea9bdda7fda
-
SHA1
52c7be2eb432e9415fae5c1411a2c06216d247db
-
SHA256
7870bc2a46a8b664093b7fafdbaa8ddf4fd4e4ffafd1084c58cac4b46906fe93
-
SHA512
c6e2acc12673fb1421f0f01c2c662b5c63a5234b9c863c1064ea5be928853026f0c5e2065c818e31df17a0eddecaccdf4a015bfea95719c76ac68a8e0a5630ea
-
SSDEEP
192:PNxyShvK9moqTJkNrv2398KPuASp188tWxDsL0nKD4PyCa3IyK3N:yShi9boJkNzfuuASp1ysh4PyvIN
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00841d46e9cfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{712A4431-3BDC-11EF-B29C-DA2B18D38280} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000083695f69dc573c4da8b49bc2c9308a3d91347e52b9d2c066c183f64434a8d3d3000000000e800000000200002000000013739a069b963b00748f2470d227b53aa42d400bf23b4c933752f19bd29bb64a20000000ad046c1748339bb60c2fa41e9dd635e449155d329f34ce9846ae498bccab4cda40000000d3f1d283117f17531e06e15fb855ae3ba6df8b4114d76a44c5ae68d42a575103aa4a84a8685eb64aa76b35b9d285cf89f024be79d242abbf253c38c7165310c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2472 2388 iexplore.exe 29 PID 2388 wrote to memory of 2472 2388 iexplore.exe 29 PID 2388 wrote to memory of 2472 2388 iexplore.exe 29 PID 2388 wrote to memory of 2472 2388 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a50300a11a79b434b83fb27bc2da5b
SHA1cec288d0bd4c97c8d4ed965513a41becaed4e06f
SHA256f59c751f65083701fcdeee0c7c7f5a268294529de28340a3057115780a3bfd42
SHA512852daf97a109d025f56d4fb15920fe794ec1ebd67bc7366e1ad0ffebe57ff01ea7383b3b48afca28c4e73930b1133712de7060ce5c5bcc3964e47f6eebfcbb49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57adb3bfd65c9528f13dc6cc644c607ee
SHA1ac37b4f20ccd8f472511b7d22ae930c68d3a2901
SHA256626dc4530e69e5c5e63639cc0ac54707135153a16943e92244fd347729e431f8
SHA5127fe2219df007bbfac04c639f500322961361ce78b816d203daf673105fbafc5cdbc8292003942cb2be14cc599d5fcfdf339359de6e24052f80be8f472d32e02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd46c1c4c80cebe1914e203b8c3261b
SHA13f3c6f39ce1690c17edfdc9d1ae82c2c2702f358
SHA25633603c77c03fcda2a0b0a29d09e3d66c52d67a60286bef719d5e33cfe4cefcec
SHA5120adae3cc8c05a62b7fc3bfe2ec50e439caa9a2e5a4939faed05a7493cf17e050b2f8b48e0def27f20aa5b344587a99233878be12fe7c6ff5fca42d2dc18afcb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549fb2aa7c105c402f327442dd574eddb
SHA1db5e25e5149ebea5c801670e5857c11c2f17bc7a
SHA256e076c6c25a1f7c44dbd1dbbc375e2d7e03b4bec6e3bef607c824df73b101494c
SHA51234124f343904ad8cf3def9a2654c487106f5a520a28d775d9ebb65611e4c36d42fef91572ccc1d15337a5601f188b16154711239b8f295c73e0eb97da3ae7980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d10b761d8b4ed4ef67641d24c5d0239
SHA1855b8e6a05a9402f92f917318e3a591d00170137
SHA25657dcb6e7a32ed3a2a95e625aad2667c628ea4b820e3110b3498d4c5bfd1630e2
SHA5121aa2b153d4a05bc1cf81e8cf67e51b2005f5c81c7a99ae52bfef919c5435f6a066a02066041d141a87c8e83883f83fd0d58013f61bd9bc29f6a0bacc1233f79e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d7b9dd28c18b820ed0bf1b00457056e
SHA11319b5971b43b24c21806063b8b2a53293a0420b
SHA25621c8a6a9c081df819d2160b0f7ed8ffd37fc18cd215823f5c5f1e4d90ead449d
SHA512075847982eecc6826a41113fe192fabe60a7203b4cd49653d9056311cb9c4e1f32ada9448666a10d83ff2a4ac88c42c0c8f8cbc16b63d5506e64f260c811c127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f43539beed19d27b4b9c7f4aa24cf6
SHA1f3a99ae5c4f7976b71b72b49ac7c79e94a95ee39
SHA25674b35dc4cda8eed2b8e90e6b43f578945684d51840ea803a762762f3e3d0c20e
SHA5126d5990852a9965045e69c2c666cc9fd67eaec67e9e1215d5850a4bda4ddcd647efdb25bc4930ff9467601fbb65efcdee98b167f74b14303044a5cd20ea39590b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513c94342caeafe3d402e851d32337895
SHA1b2801bbdcdec70e9d4a53a4d18fc0be99e197b8c
SHA2566741dbd74a9775e581a31fa7fb831c0fa6a5a3ba41e90fd13d76a18fda8ef283
SHA51280d96fef81db8b84870abc3df8c833dd20f126144db0f10eb1a4bca5862e84c63da5ad484606fb39a650cb79416da3c55de3736cf67aebec181dac4422c3d264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c26553512f1239a76ae48de448822d96
SHA13a9f2671169a37bf35f70ad0e962d113369173a3
SHA25633fd1afbdb1945d42fab1b284e1fff253263bdc488da5d81c12c37ca9c8d1d89
SHA512bcbd2257c469501c55baf44dacb92b687a37e31671d527d5281317ec72dc2c0f08f86e22d5d9b45e1d3ca8fdd38662ad826303487e14c51675dea84a5daa0c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
16KB
MD5bfac89535893ede11b27a46b15ff0e1a
SHA11f6a26767338bc3cc3e5368108520b31072a5934
SHA256d1bf90b153f3fb252dfc1268b06a54424be8dd5ac5eaa951490f0a17ecc0d563
SHA512727e94f56b6a49ab6ba2cee9f4a644af503214c356dd580fc1e4a9c580dab46f349d71aa58212009daa28308216d5dc0adcb912d835de072636e56e13c8cee69