Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
background.js
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
background.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
contentScript.js
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
contentScript.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
index.html
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
index.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
log.js
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
log.js
Resource
win10v2004-20240704-en
General
-
Target
index.html
-
Size
8KB
-
MD5
efd241d91e5525fbfa6012b24b6498ca
-
SHA1
d46793beb992a090d1bebc958c709fcbf5a20a71
-
SHA256
43612999b381ca91dde37f9fc4096d95091dcd79ae95465c404fa76992648157
-
SHA512
a4d3ea718fc886939ab52d2799ac817e18eb2a99046374f6c595372785d9c84a07a6051f052924274b8ee5ff0c25321fc46e255669ac9aa6ad4cb5c94caaed5a
-
SSDEEP
96:7QJ5qU4E9O9AZ14R9Be9BeF3VG0EErV9FkXnaow17w4gL:25qU4EoWZEe9iJZebw17dO
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000624cabe28af82951790757b2442237f72d1037eb6939728ecd59355d097b8cb4000000000e800000000200002000000073f8a6c295b9cedd02614cab268a1967467719a97ad6f90a11121ef15455ef762000000082c79935709df73123177bb432ab78d7e45030d4820bafddbbc6ba716735e19240000000a51ac9ea3a342c47f6b524dbd97a3c2181d13d51f119c7c007ff7d823efb4d2a8d0571acc494e5bf378ff350fd133c6eec232013a48dbc69b468addf7abd1129 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00c4a2eafd0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426547209" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56B29781-3CA2-11EF-BA91-7AF2B84EB3D8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1616 1928 iexplore.exe 30 PID 1928 wrote to memory of 1616 1928 iexplore.exe 30 PID 1928 wrote to memory of 1616 1928 iexplore.exe 30 PID 1928 wrote to memory of 1616 1928 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\index.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f62c9140afc3acb471367cef8bed3b
SHA137f555d9ad0c035e050f8518d7b2d90b2b60a9f1
SHA2565baebb23cd27b6262b3051bcbab0de4ccf6a31c09be866ab7f21234394e921b3
SHA512d28c90591300cbcb74c7d063170a6098f2eca827836af63522d900b853db049ff4b07c993ea810ca151c65bce86aa220e717ce6d14ca8cd0b216f8a677ad6af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57312118e9d57638f6b03df7f813e236e
SHA1737d3246a54a9412d8a8e36c831c196b22db61d3
SHA256c1f4378652f23fc888ceb230d8c965c059d912626d9b1dd4b1ed4452e37a1ce3
SHA512fd4bc424b30e80be5eb18ee92aee0883244b356500543e9f5ec66bcf6362f0fcb923196d1bb3927752df208f0a296c08e00b6fbf3d69cabb7525ebd53ab38a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab539be9b7bf9ea0390ca9d0dc81f2b
SHA1b12db9aee7ce61f8c21394177439e02a58b95784
SHA256c18f05010bf4e12b3f53ee9300d6aaf1950800a38bc5a71a3db34bc8c8f844a0
SHA5127b62e61c39beef5f91cf899d6a3fb4329a07ed91acdfeb466090421d8039e52c5646177472876833b834105135c61e4ef560e9b9cce1d4a5d3134e67318295e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d2629e56f9562f8fc6a47ad1ca6e56c
SHA1ecd15ba5b0331d5f175a40a1ff7d674a2fc27d7d
SHA25682130f5265613bc185384aec82eedf30c2c9274dde9e1cd6bc6e60424105d0f2
SHA512bc25aac50b6a4ebe0ee722e90872770efdf34fd800466bb9d4e19edfe50a1185bf5d052581de18f658ee8fa365cfe3c79784f3d555f2cf5c844b7674435c8360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a52a277d90991f638112a3f6c3db1d2
SHA1149a683dcb9d5959f04ab0a1aa3a19aa7774e7f7
SHA256c36c700b750ab23235b0ffc3e31fce8e230e1449e4453b63563129735a219def
SHA51278a15aabb0304b3fde948dd222131032bd4dffc003536ebf6aab505affe3540248679955ee127faff6ba11e842bd7b48c2cdfe526b5010d83b0802a565f0571d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf20327bfe47211bb057ad26ecd4677
SHA192e8b6f61dd5774b147e6a60f261835da010ef43
SHA25615b29a8d1d7ed3ae844e30bbf86a878d810b66eb5e2ad017c42c5052cf33ea40
SHA51229bf7c96661666d0ec3a0033ba72d4838e0255f8f977da802f7500dc19703b980cf1099f33a1fba8e26c455b09f8052cefc2a7300cfdf5d90ed98d079d4016d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567597f9639cb9a2d8e2449638b6eb6e7
SHA1f171e8676b214524d3c83672c30964f944fa7388
SHA2565404d3686603573c04bdbc4b1aa109cf036653b2b86783623a607a662c1429c5
SHA512b51e79c2c613cbf201d045c5dc623e52c19e1ed23d87b54c07035c3f5d148e0be7879f2356dad63354a1c3bc033cb02dbd78f679da72fe55aebe7e07cea7aaf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4416a3a5c33993fcdf14eaed1df903e
SHA1b79058324fee40416edd45a97cdcb005c99ad288
SHA256fac5f5065ffbbebfd2f53cb9d4e030a91c3f1cb4c955218c8b491c1ccc3787d0
SHA5127f9a4a28918d34ea96c3df94a81c76571d246cdc386c87db7b6310962085edea54d9d18f0e72e5990a1c417f9e5bad73bea86dc1cfe472d89c1487342ea4aa22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61ae5048d53d24fc58ebd3eebc18c31
SHA1d5309a401ea54c7502edd365969b191f6322db5f
SHA256cb2fb7d49a7554a8688a0c0b77dd1ed8cbf2aff1cac547967cb7c19e95b6ab11
SHA512d2a587af3a0378fa679e2c1411afad9ae51983a9f39c1f54c3cf98fd4736e1baa433819af9588ea1fe6b9d209decfddfd75928ed2bda5f915f16ce4f2b8dc0c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fcd8eced1a0e603b5e53cd109b16684
SHA1904213dda989d7f68ec301d7e95bc1b375d42e0f
SHA25621451fa27ec96284bb747c35691bc2fb0c31e89c76811960cd78c9781320b3c5
SHA51286356ded715d83d3ac449ebfe14702b4d0fb6a4dffb2e02669029728f2f64a1414b3e0c666c187149f051596b05a2797a6d263d73704899dffc6875c69acc74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a87bf2784b1ace30235a004e5110d44
SHA17759ae614172680edc188cc6d9e15f11c5032bdd
SHA256de526933f6635036595f0761c4ef181c901bc201c12db0394c16583f6e0e7916
SHA512bfe71d54cfee45bb03cdff75c4abb946394e9337b269317894befc2bf79b25efe2580371c6b581d3f96c55907061543fbb744e46cf9ab0289f91ce280d51bf9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552ad217a4d48a2c5ae94436a06a7afdc
SHA100240f7988f3e9c4ddc6a6602053b1696dd2b9f9
SHA2565219cbb042b7c7c205b23b050f99729318b894cc41bd74f3d1329afba724c775
SHA51212a73aa22696514fc64c9d296d74a0ef28738c2019647a76be9abb613dfa7a1d33f4df1285c1db6e7cca4d388ba6fb9d2e8c455001daef32d44c1e5dac447a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fbe99b0f74334dddfa45450c4867cf8
SHA1272699b56d53001197bff395d1b472fdc2c310e1
SHA2563aae89c1519f9bb30ee8734a982aaaba4062d34d54186ba39ad73ab17d85a79c
SHA512a9077b82e992ed93b82912726b02c97012ac5365f40d1bca55aaa5411b8ce7680db199029c97bd24fbac72bc48a1e02f689550ec921272628ea2b824a8e15579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678c82c0610c0e839cc6bc2caad9bb5b
SHA1e423de74fd78e305b6b86112a9e3fa56ad4ab070
SHA2569a9a42227f3554c3a5ce3d4fbe710b9aa79c05f1dada6c6d9755cde1fb7ac6ff
SHA5126f110fd2cac4cab977c93d8e2fbd049a8386e2347edfd38ab8b2da3afee99da4783e885a8ecd2ec42d2e339d13e3d7927cc7672781a55893c911580136325016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5123a8984ff4e63e618fe8a3231aafbcd
SHA1b02948e1d0e3207b2379d0713052582eb671b393
SHA256b78cd8f862d0585f03f9999591becd1a91662ccfbffd99d68b01e70d77d192eb
SHA512c00ac64f47809f0f627920345518a7ee6a093c95d25b8411f4de014e054d5af6fcb6cb320d6dd182af8bbbb84dae64079b31dd4cd6437a3204753e870cedd95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d8875832535dc5bbe9d7db57353840c
SHA1b1bc0d678fd86e359658e2498e5363cbcaef4270
SHA2563bb97a3cdf728d285363c152129668ab2ba817207d8bfa6fd83abcdc77559105
SHA512be324efadf996c7b9cef70410e0bb7390a1c9c1066da61fc75d97fb950a5eebbc925b5d585e1ccf62aec879372e3d60eee84be70921200721d3c41e48bc72cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d7398b77036611971abd6016532334b
SHA18a9da414d458a1af8dc6a902cdc9d414cfdc75b7
SHA256f251078356fe736c746247515567d6e5876ef4b5ad9a5d0cefc7a517ffad1b21
SHA5129501c5c6f63e5a64e90d6c2779b92f2281ab718493c3a09d6e07879f4337db4e882af70807e72d519800dd5cd666472c6e7a8f52f36a2c860f49e14b7c27ff4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575de3f7f0f907bbc6c59e29eaf08b65b
SHA18864716ef71c7c6f0f3942951aaafdd9634ed7f4
SHA256b3cf6f3530af2b3be25a6438fb6f5b4b9316d9f928ec2cb2d6b1f19b4d64ff1f
SHA512a80aa7902db2cfea1b143688710b79cefea3dfd60cdf6af4a9d97fd92bb78b47a77b06aaa4d44c8b2840d7db2e7abd437e84f1fb9a63b5ab35e206d958db403e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d56a803995b85f0e968402e3c718f34
SHA16b62bc7127add1f9a76824e2a28c4ccf53841b44
SHA256a5814415f4ab5b0b5ba8fa959203b701b4471ffbf05504c1f95d76313d7a33e7
SHA512273da930aeb6ba28ea633db447975486ab9f2af2300ffb11e40c8aa464581ea0999ad5ba43c376f682d88b5be08c849d2e9389f4527286ee61116e4c73765569
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b