Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
aLZhlBKT.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aLZhlBKT.html
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
aLZhlBKT.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral4
Sample
aLZhlBKT.html
Resource
win11-20240704-en
General
-
Target
aLZhlBKT.html
-
Size
2KB
-
MD5
f124b5c09d374d0f69d640b89a9ee2c2
-
SHA1
b3eabbdb05e682802b862161cd584468095ba168
-
SHA256
e99ca0fc692290f683b6a3e0ad3812894f539a4a7c8f20998b17b006d1e92dc8
-
SHA512
03477213af313cad9fee791d9bed12ac887fe999b19169024413720289037e2b832f39d99a6de270fe124f4560209a6ea6c5a4a6f415ded5dfaaacbb898732cc
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05050acedd1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426684005" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7C86591-3DE0-11EF-B585-FA51B03C324C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000044f720e8b6a82ff61789278c10bc45fb21252bc25f8882687a7b064bb0b40603000000000e80000000020000200000006ba2f2cef1d6b58d4901ad8078aa94baaad401cb10e6e8e931833b3442053f1220000000d1563d2503145d018a87ebd964cece7e2e0a681e36a4c11c08eb6d8ea801467e400000006042854a900ae19e3a5929e55b4b3746b7913363444119d20d2fb260d2eb9f35a46cfca1416786741002d4d72ede759b9d616109a80d60ffc187eba0126000f7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000001fecc41ca670c29240cadf30d1f5ee24aaad6d81c575fc1f5694a24d55389d96000000000e800000000200002000000093f8cff71ab9e6b857a6f8b66bff03e0787f243a0add0d33af1c651cfc4903869000000021b2c99f86fbab83e87000f8b30b1cc471d1c5751a0717043aaa21a7d6e22067d22cf5e355470bf8b7d3f037bd8803b0014a1c88d3520da38f71fc5796d18fdceaf70c35bdab5c1ef932c7d5db6897aa40074c97e5a430f00c0be207b68a0ca137e162794647390ab69ae9378eb411abefff9c6975d0ec219f7df68a8344058157329013d2d7342317143d007c3d2d3a40000000847fb52f031bda1c9f6d2768aa443ac1d0c9a2d553109b779fc1bd3e9425223d624efe77e8684c933fb862b48cba04d39df729c5b1acfbfc817e319bc69abed4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2400 2412 iexplore.exe 30 PID 2412 wrote to memory of 2400 2412 iexplore.exe 30 PID 2412 wrote to memory of 2400 2412 iexplore.exe 30 PID 2412 wrote to memory of 2400 2412 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aLZhlBKT.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e70c70caf81961b48bea3b0124241107
SHA1e879960ac98f71f81a61c06fb6b90d3f0f925793
SHA256d98882c94cac2c43ca21e443b74a374d89682604214c8ea1af54c73af8d28340
SHA512ebfc558c82d295d0773a8081ea52bcd1281492122a44f7ec21c5b5d14ec23ac8cc9b1317b24f829abe2501f265a035b397bbce00d9d87c80264176900bd3a5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b67ed6476d8cab00c9a2d68f7965e0
SHA184bc101b5e373f3b86e33933d4538becb337d114
SHA256aed52baae58d27e909e0eb257733243bf13c3ac091d713d85ec5eaa051ca1e64
SHA5120ff11bb3384c1977106d0abee8ba4b66c8d821223afbd0e6f1b595c0a8de1c6b1dc23e1ebdc6a1002b5c6fa10d20399a2fb32cfd76d17ba89d8727deff7ce508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce48f0da9f22e08a7b529b63f8923361
SHA11c828a6d48c403e6c154823ebaeab659b1e7b4cd
SHA25651385aab00534372c11e49750796d2fd11d7660fe777955613714da526325780
SHA512f14fb2bb2324269ac8e486bb88295967e9e230b7b21dc384729550c1f8bf0f54c07d80fc3a34a08c4b90748053261cb9a924714bfcec0f895f842addab60a29d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445a9fff832fcf1aa89b798452aa07e1
SHA101480cdbf3dbe48eb2192afd83f3aa48f7387ce1
SHA256d921a39b00b7d37f3877dbea83e7fd3c2a0383f6e53bc473b3e768ac67b875a2
SHA51226f082d7df6c1ac296041f9613c86e42645c213f9c750ccd343fdf6ec99e8398ded4a1e283f7b0538ee8f08fb93fba806fb56329d68131d1716702f229ecbb07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6a11c972c1eda4b5ef73a22517acfbe
SHA1377767aa593767929566844a75c0a765e19548ff
SHA256cca80301606bb7971b8f2538c47935f85d0530f4e74808ff0c79cc0023dd36f9
SHA512cdffd328b7f3c3f38cf06e73db93f591085270a4eb0981e38b3d9754cd99182d71f428a8f20c8eab035c7ed02cebead626bd8e0236821f2a33fbcdc5f8130b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533480aa1694dafd7f9d00280e127addb
SHA198ec7f4907143790beb90f85b084af1445f8c1da
SHA25673c1d4ba5014469ba5c9c8afcf38e0c60b162965d46b6f546f2dbaeb98650057
SHA512bae86b6eadf5d74e5b1d459f3f2ccc78ebfc0c0024dfef769a76d8f35f55fa6f11aaef5e9a379ffa7b35e05ff31497391748351c7642e55d634ee5fefb7b7729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5986bc6029714f7fd66bacbb90d64e7c4
SHA1279aefee82f853420150942bfdae8df782c5ea77
SHA25638f772df919f6286167780eeee92bb1002d22ade0382a1ef076842e8ca5c1503
SHA512934f76671c7c169ab6ae226038527ad5fb7ec3e52785ea75bed7993c1fa9c8f5e14d4336e592ae70ddc3726099684e66b3f656a36be25612298faab19e1d1daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6a98a3afae8bcaa7b64a3c41efe088b
SHA10e9f91e4f4eefbd8dab10c836f36f0f6d8076d0a
SHA2566a42c21180ef8cd79c4db6e8dfa0acf6f2f625374213eeae492a516c604f5d37
SHA512f8f821e4f101ca8267eb6f3c9ae81fb099dd2483a5b8c365c57e546c68a5239ba57bea66b3ed22862b1376a317c3105a01d88bea20b96d45dee7abfd205f0b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5788f0ad07f31d430f92de94352c4d8c8
SHA183d023e33bd19b7125b8683a1c9b6cfb03273a38
SHA256ba4abb181d4ef270e1f5ee21d01c97590fb1bb06a11b557e8cc59019e193efae
SHA5128951572e5fcbfde16cf588576e4f74d131d381bc59140c63a7379fc9285baaea90b5ae2a97d0353a0d1381d9948ceec68e30b81fb5413fe3ed3bf41b40d2baf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8aa8abe2c31e33174b86fb5ed857011
SHA1ad31b94de075f45bb55f15b76666ac55ac6d5b59
SHA2565cfb44e034829ffbae733a9c9590cf27e4a214e6c43dbb86b798e29953a112ca
SHA51217957aef635fde51e7a3c8fe24693cdaf30a4136587b154edac743987220bc48352016153eade1cd1f3fb87cd0be3138a7bd182ce736be507a541790d2111c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8409c18d21810bd3dbb1c5b1ec88c21
SHA134a94c054d2cdb8ce924eeae66b27fd947804e78
SHA256ac281735b4fa23f1d39d4457b29efe230aa39f561f8f504284ea67672cd07bf9
SHA5120d3dfa622f5b17237fec25eb8f675ab1b35858c4ffc5144cc5503b3ee943c997d1158703b0b3e483a37c52e906d5517b781f9034419d6624fc9a2e6de39a4742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576713425ca915a427196d7832a1650bf
SHA1d6788d98bd9b072cae230e3a4c64222ebad2e6d5
SHA2566268ae1cae74df6793ecded048644478eebebc7187311be9e8b560385375806d
SHA5129e54ce3c798d588a6b4666712870625220cc86cab55def077df2f33c0e01a55c6a02b664df151727dc421beec9a3bada6200f1839984d664e273b98ad69dd699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b177f4dab0ae24e68bc901613056d5
SHA1195453f4ef00c52b12974267eecb00de151018b9
SHA25696c04989a21afde3c2fcd0b3c4917aee6ce203f899225bba49a638a7835bccca
SHA51278c2a2ee7d342ccc02527ee46b998534189accd3db129cdd87740f2c396ae8731f6a234132c2e1a6cea81b4ef92dc8c82c09ba9344ce1e3e6e42f8e25b7e25a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5103d15c545ef8e1e0bff5f425bd834fd
SHA1852b213bc3693f4afe462c1ba2748fd8b19ab661
SHA25652e1198ae2c12dd895d9845fe252a9f915c4cb2e6e129a91756634c9cd9324a9
SHA512b8dd638552a9e6da602a4770ac0a924983c68c43f8b05471fe54e01aa361506a46f3cb9b58123f749f649dcfece5fa7941f4c65bc7d942f56c7688a265919d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82475989ff015488f0585945ffe5ae8
SHA1682c8179be3a462d69605939fcc716bd27fd66b7
SHA256d4a3b2d577d9ccaedf9946496156ae7f0dbe3e3863266ce76d8b533843513172
SHA5127c2c37ac3a7a2e418606cdc38273998c53dc4e63e78d3c4ed85c4899963099b5edd8e5efce62b2ae4de2386baca8c2821088c406a598efc37878080fe7ada230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519c4a5f70a4ac861ee174b74f23b7c9c
SHA13651750cb60fe81c93404125d706485c865ce410
SHA256a2f0d4dfb9705210dcd86eb62ca494e07e0cd324796656d7427c9c568ad92359
SHA512a985d9dc5e2151b1a9ba2be00ca7f9158401c3fc872f9760a84c842b3e78e621cc51bb950d89b6181de4fb3d422b83075702de182020aa2e8c2401c7b7654d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0a0b897fb845f58246814cb5170c10
SHA1262cbd1f12a1d2d9bf7d61edbf5c1ef76dd1bad3
SHA2564744eb7e7e00fe6489480cf1c3352bf01b4e57976aa3fb784d5ce851519f709c
SHA51288e8f27b039a633fd8b1f53709b6bdbcf00e2d8475c2b90f336661b2fa109af66f02350ee67f5dcb93cc86c9d1c706c5f23c5635d8d94d2105c4b32a319088af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c00c448a88deae5729b3be63e4dcafb1
SHA1998fa49f5ac4b593fe1ee454fa6873d477884bf4
SHA256420b7bd3ce7ef32771af3b69649fff0d0e043bb4050fe5a14ffc2c550fafe827
SHA5124f0295d06033569fff2e5bddc011fca6c420ec3d13361ec6a81b1e902b5118af86ded140add891350f2a840cf1dda4393c64cfec657403e46db6f0196cad550d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e77f3d4139f3caac544936bc1cef0a
SHA1a23674fc6a186c5b9fa3d7f23b02de7e41ab78c4
SHA25629fc239c2ca250b4bac7263839aac91d7401b08569794f3d6ec7e887323d0fc2
SHA512b8d02ecd77fca76cc3d67783bf77eadf360eb1141862eb49d1fe25d497b8dba8d8d5c8d78a08e33726ce91cabb02f08e3de2f111c387feff82140760fa527eed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b