Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 22:12
Static task
static1
Behavioral task
behavioral1
Sample
PO ienova.com.mx.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
PO ienova.com.mx.html
Resource
win10v2004-20240709-en
General
-
Target
PO ienova.com.mx.html
-
Size
85KB
-
MD5
ac9782fee484b68412f9e2f189adae60
-
SHA1
8be1390f2eb3c8ae2a3832abbc2caba512e5cf93
-
SHA256
b1a7059953bc68329f14c4d130dcc96d8348ee1bcc8598a4fc1a946a26f39472
-
SHA512
378100f695d7bba8f59968ff5566cc576963c8e8248d8fbaf3629c8b4524e9264c3174851a5f82330e32bac34dc91abe1bdf22399d402806f900becfd1b7092f
-
SSDEEP
1536:S0ejckb/MbMPpFCm2wySzCX0W5zbnkGTrWRDDLQEYAAnMwEUiCiSxazg6:Suy/uMffCX0W5zbk8rUD/bnC34g6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000054850ead364881d42a96399a6230f5cc100eef790e14f71d0b550cef6d851a8000000000e8000000002000020000000120997629c08defb6d363dc1705123ebe11ba4d5646290917c74305a8f09f12090000000902f33395e475c7112a638909f3625eafb193e0b743c466816233251e7372024345fe75f8b9f10cf5601266918f3a5cff6d1c76c0885ba2d302aeb04c0d6aba4c4647fc08fd0499053bf02027e89c20530278f4e7b6b6211ddc0cd18afa1417e025d60252ac7d5b3765b523bee25c3d9adb1aa54c1763d3acb5a069dc4963686a6d4fbdfb42d3838071e82ca85f567bb4000000026f852f8a4964b1703601d67f79d239bcc81b0863c97b06da2033fe78218eb06b5d29ddcf433415e9f519dda5e0c378d01b67d85a4c8d80199d4ec06cbef2db3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426897802" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000e6be4069564634eb48617853bb79038479091ffad33ec3d9f99bd582aae9d612000000000e80000000020000200000003c40bdfa08d10e1886d38e9eb7ea93cbd97f73e76d9f037249670cf12d8b84e42000000010530428cd3173f7937e52da8e161bb3c9fc8006fb93a5d9f2c3b6610c4f865840000000dc59ca1b3cf16d9fbd6ed2a93aa54de3b4a299c71c8d7fcfac67f2d46cbf0576b90d5350525c2c6bf5020d253224c266cee62390553c1fa19c7cce097a2552bd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1485951-3FD2-11EF-A1BB-725FF0DF1EEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f4df75dfd3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2688 3032 iexplore.exe 30 PID 3032 wrote to memory of 2688 3032 iexplore.exe 30 PID 3032 wrote to memory of 2688 3032 iexplore.exe 30 PID 3032 wrote to memory of 2688 3032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\PO ienova.com.mx.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af7284600c0f8971ed00d798c904606
SHA1ea61bd7b7c51dc003625fa4ea3e2f4156d634cd4
SHA256982f78b18d1e23cdfbb314a5ba1207e7c5d78bdde2ca63d5889573403f603238
SHA512339b7f01d0fce938e20185de24b6f10602caf222d930a03fbd102e5976f185926f7964d505eb2994949d2b216a591c91311320f93fdd6084b3ed5fd35390947a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5662ada91b0729d8804eb81d34451cc5e
SHA12e31bf41ac4ab0b0cc2c930c4234e24881ac21fd
SHA256d8e3cad0926b4f0666b51676a1eede1a2a12152399344937cc57d0567c5c697f
SHA5121e559d14c44f85f5e58b23f7bcd569c172da890d64f43a7d8b230a0a6b9e5a64ef0a95e6de78eb02c33f82ee760c0045dd2859514f8bef7b1ca67805fc3a000a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23f63e4d0b686edc7a5ea0ea0938bc5
SHA170008d5db5c9807d87c03637061f5f23d72eb7b7
SHA256ccb70cb71d5cbbdca00d068e696f92ef95866ccf34ae25d22593e0d9f64c8e4d
SHA51234d41706af8274891671926a72760945c98c583c17a384e7541d4736453f95ba324d66bf8bd7f123b4fcc2815c565c12ba527033661b284ce54be4d966f3f0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e4be9d6bdcf58ec9b6cd17f61181b4
SHA1e14292340cba7c79737c2592d0336fb3bdf09877
SHA256263c52b510369e2e228817fcaa58c6caecd127854ed2b6bd80c9042c746d0826
SHA512c74c429cc9f8a6d889d31de145a26b3f5ed93a12664cbd4ee865a33c9f1865ca4594f6757e7f26fc56d17346857b2f679a72b47e829ba4ff791e73e198eda7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d02dab6f9f021fe832844854cec903
SHA19f57b07c7c30ee59a1427f87e691a9d85d26a13f
SHA25660731ad05f90351e0a0c38a6b1e5f3a0360466e9f209ab42f018a7ec6eafa7aa
SHA5122732d04032cb86344fb58b40a5fabf4bdccc924f55c24712fd3ad9c78b653536a1d589870fe3ea78aaa4c53f167054e71e10f974839bc06187948dceb07f5324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd0d9d6dea92b36efe4d628652c34f9
SHA197d901f5bc1f97257de1aac70dbe81cdeca5c225
SHA25687e431374663439bc1ea87438eafb6ac303dbf28a742c1b6e7a75d4b33354834
SHA5129cec49a1cbf03172d641fb1f112be9076aa8ff56019e3c3be1d5d260962229ed8c934a52ae278d7cc2ba44afc5bc99aca8a94fb40af9fc14f819f4db82045258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592b1626eaa53027fce45e03693a8f380
SHA1037bdf239a7642d02b237c01d141bccb62a33479
SHA25672b6ce7b977466f2c8d74ed0989512168e175ebe0e03dc4f406644e7fbf1efda
SHA5127e923bb4220ed6459db430089f5a539d912c347f05670ea0cfdf77eeda21932030d44d516d652044bece406b5c4503676e8ca2450aecf7dcd86a8cc7cbb6926a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568bede4e2e3b446b68e214b6ba4decbd
SHA1713c83854e417b947e7974f5c9e66d436a94ab51
SHA2565279501dcee018e8d29007c79b7786df4f4ad8f7d0e1a8a16d4a08e10f27bae5
SHA5120e15dbc524fc5b84666061a53e9d0ca3291aeba1f01bed0256db904658c5cf57e3b811502464486270758bec8f0c68729b66549bb7dae31f7838014f8073d003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ab1320eefa7f09423127aa74995917
SHA17658b7c40ca6b6e3148e9707d1520f3e1b3e9912
SHA256591127c36df6095f8fd38bcac4949afb38719b0f6f3975cc4fac434b7d63bc3e
SHA5121caa0d1d754f973992146c55ebacef5be841f82e85d15a47a8f607c01af24357bc4f1334f920226aedcbc3243633516487907be03d8dd1777d12185f1f4175c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ac2422a5c447cfec36e7dda842ef222
SHA12fbce06a89f79ad2cfc8c05cb86d7e0f789d8717
SHA2566b7a758c7ff745f83288bc28e1d497beb2ed269e8d28d6aeb7ec302252b42efb
SHA512033fbebeb9dca50795fe7c571f85c0608b4cee02e255b9ba6bfef745299d02902b63e8af0c36d3100651a770718e94e8cd09af6703bd38cad3a366cc80b5aae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6008e36804a0e8732faae740ee4ff13
SHA16df0d349cd9c2a5be3a0035f08b514863455e6fb
SHA256ecb4bb86aba3bb1299a26350b348dec7387abcb93aa40200a7851511f3814fda
SHA512aeece121bfa173ea285298c257df21c4a7c69ed3ee3a88d73984db4392ec054e5065e57e70b150757a71025a8c52d0f5e698c3fdb256daa8110c3ee544e95a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57357b3aa2857dc8c499626561096db3b
SHA19ddc48234cb80a899bc67c3a2f9392bc1076ff00
SHA25623b44ad11a0f1860c2ff5a1f95bd3d1776b8d05c6c596f7fefbecde995ca4955
SHA512260976428c7e0ebdae2b20a60cf805977c25f111a0f988b9a3dede001cc9c0c4f715b9284a03ab94695c01e2de0a58fc542c5d3c2bcc9e660f19843e1b9c7a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d66ed522254c56cfea38765a72d21581
SHA1ac4cd52e1d4ab4603b5030e11103b01515a6d0b4
SHA25647fa32aaeb8ecabd2f9afdc1f86a86f3f721395ebebc0cc6e742029b5085f515
SHA5121e5cb8cd66265b11d112cfaec918a4e48dec56c69a761550ebb4b98b14927aed4d6422e0e3a2bbbcc45cfe44d3b75c3380d1ec4610e2339e1a3d9b396d0ee352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d016a113c922a44a7aa4945d4ce4379
SHA168fbcfc3d65091d35b01583f32ae7e02910b0550
SHA256a34e71d91eeacdd32fa32c3c5b2de4681450e48f9370bfcccec6c14b7e66e21f
SHA51271236c217c582cc2bfa88faf455420d56fce29f83e4069038f725116b7c7eb44c7301c7b8c17fd44c2f72c9a03394f84aa4cbd538e41077dc31ec523cbfeb22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5853c0c337a09dae8f0ba65c8cb802eb0
SHA10927dc9bbef7ea26c41e68c1b4332557fb8a9c97
SHA2564ae940c7999bb98a4b1550dbf5387c960621cebde2f8c02cf8883dd07288f2c9
SHA512256491d066551a9c3d523623e8cbbc4644b25bb6111f316510db7eea579a2cfc8aa86b21930f92b900bafebfcc891ac841467778dd1112e7fa8b0eb96e54b275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bac04cb3103ba1525f9d3f3d53e4b3b2
SHA1fc5d52deb75eeda87dd1e9a4984cb3b20334545d
SHA25655e73d184f8fd9c8c7dbad9325706aa52341052c55c8edf40eee138e13a393f2
SHA512b8a95d83ec34bfd4a3573d9da38aa1531b541a3ca2402ef1e496e469b584e34102230bbf97a4e105ad343fd380804692d28f27c8cc6d60a7db95f4a04e692a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b28f33882c6e894164b0932ad475f819
SHA1ddbe0ca31698ecdf83e51e2aa1bb1b3c28ea347f
SHA256ceecb5842348ffd9b1bad39434dc583868816df2f592aa6c4a582134244b94fe
SHA5127ff998af101f3926a9896fda6a07c19bd45270e2c965adfdd9d0c048972da45f1f75a296eac2b33109313edd43a22006fb3ff711161132a3ae24667f0782ba55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560689cada92c39a056373dcae1b8385e
SHA1320b0b4528dab99713f4710ca94dc4c4a3f10cc5
SHA256cbfd87f18e481531066c99e4b2e9943e66283a8e18f15f0bf15d58c2dc4fd98f
SHA5129c3f3effc74c6f1644301e7ef925b55d03e624913dcf07ce7bc1125d30dcf99222fab2a5a0b4b9e419dff6127b7fb9648cb36d2b23b4776e7864b23726e5e65e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533dc51a188666b64a711c155ed989a67
SHA1237f38f2c2cc99f37daed8f20f73d3ab96b09424
SHA256ab0321e20391e67c68a90052c3a41de0d5bfee996a3dcc904dd25ed1180e0b1f
SHA512b877e7caf88d61a61e2852880b4dc53f8ef22c43c344bf28a32c3e23dea47f61d2043f9c5ad22d188820a7512cec96cbb9f112127f3e388a45743d16fe340fac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b