Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 18:05
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240709-en
General
-
Target
sample.html
-
Size
19KB
-
MD5
6fdf4638609055466a07175d62372353
-
SHA1
b17d268510de0655969f4e9a08b331da08e4e7ec
-
SHA256
fe22b55f26b2670cf691e01a52a130ba8bc04f9aac8a6a28d0da4d10c936c0f8
-
SHA512
e02ac4c2286de85ba4ad81fdf4f72866088e59ad0778bb98350b9407b5847f7f0bc6f72282ade99f9bbbff68dde9d9c8f38f43db9e53096a1ce157d7a3c7a111
-
SSDEEP
384:IYQwKspY1ocy474lbGaEBvhpN876t+u81S2m0Y3Y06Ib37fX1xCejiw:Ip1ocy4UEawJpNK6i3Y3Y06O3bFxPiw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000975801c1c5778c1b60283f2217c7f412d82bc2607e82be757033b5f37a7033b4000000000e80000000020000200000006d73a6301a10bc20932448f6cf79c5b4982b5f8b1b28fb3214a8c7d572459db4200000007dde402c8791bd1d9ab9c0fa71fa069373d32d62c60199da462262808d4b1c5640000000c466c0bfc1e00ccd9d0db0ec75f28b0c6f6d1a459a349478f40ec22c34fb1f283906fa088fd843311ede31afbe88fdb9d8ef95ae38a705c131d309fc65b27251 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A9D2B41-3FB0-11EF-B93A-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e42bffbcd3da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426883001" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2960 2636 iexplore.exe 30 PID 2636 wrote to memory of 2960 2636 iexplore.exe 30 PID 2636 wrote to memory of 2960 2636 iexplore.exe 30 PID 2636 wrote to memory of 2960 2636 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f6011d67cba62f408bd7c232f9f222
SHA113b383075dd29e1023b58096de203e68e581f5e9
SHA256d0dd6dc2827db661a974f61ef2dd714992f9be427f387a5b8c93968c5c2a9736
SHA512b03d484d8992e866ada35c634c312759b96a67f3862f789d8dc3a9f2940f0e4446766e351bdea6bc35dc1fc2c080b5409e0c8b1628f4e8d5975555e1b9e63bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b46299038930f457d6960715cfccef32
SHA1f96e6860493cd9a46f0f5a84e9a8983e59f2b8d4
SHA256399050ce0427c73221f83c4cc9ce28067245387f485b8d9e1f6c618ebe071985
SHA512ad6a768c1850e6d14b662f9117c979b2437dc62d3bec7ed7f60142da75f051ea688631cd8a06b2fbe15b590648aef5664d266eb737e664c99d7fb583e305ea42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b6aae58261344f7578fa423c93690f
SHA150b3d925fca3290ad18a414a287aa0132fac78a0
SHA256e791916a37b5191f46e266c7b9dbfa9831dc56df785f3b04b992150b458fc089
SHA512d5592064cbbe5c8924e3e6c9c896f5987b382e7e7e24f9f96a0b0f9212e2ca23932e80c68fc9df9a8683670b8305df6e0d3df2f5fec0e0c4f9dca43685689e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a1b4068ad24e64dc0a8f66e3e838e00
SHA1eeb9e0ab2558af42bd4b69df7fe3020c20856c14
SHA25649312bcf638fac009f89f7d71a0e5dd2f3be826917f38672cedaba5207f87230
SHA5128fd4fb9357819548a82b929b30e933aff333906de31480dce68a6286ae7a8c231eea6db0dbc020f5b941ddbaccada4d333ecfc43420cdc437c674afb4a6d9ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a321705131ab25aa98b227d5c7c05df
SHA1d3312c6c7408bcc92abbe2a91920af1c60811218
SHA2569b97b8bacfbf710cd26f0793ecaa907d4017cf0ebbbab4462d80ccf59445f22a
SHA512b4257ca245bc684b1ec447f5dcb554b21b3bd8c9fa41941d787f585d45d2e67223317718e171d6039e53af6bb80519214e54c47f3f3097d323b6d0e88ec549a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c0ff837aa53a15cece0c095ac4d1de
SHA119da8e9e7b8fd9084b4dfbfd4bc0b0dbfce4129a
SHA256d480c307b9312892c128f11d713a25f06576756c75e6357a14f1e2f3f5763aa1
SHA51237fa1ab46ff87361d8375242bd934213982306d6622bb11c3a1a6c72c0e22bc73524a6f922b7026cffe1119908dbeaee0c26fdde9a37430e97defd32da54082e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c0d2019684025238ed7d6a4f435a2b
SHA1e7365b055812f8a68802349e9bd0720db03f1dec
SHA25633ba5a719ae3ac81ec582f6f3794947c10b694f6651f05691c058f315d284d4b
SHA5121a8a4c4a64621d496d59a655de2a8600c941b50fcd4b16a4fd783b4fc946cc1dc3ddf03cf5ea15f658c4b3d5e296d9768c91e72f5127ee19496236800784ab55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0ebb8b6983225e317424c448c1220a0
SHA1032ddea78b400928691f9fad858082c5e60c2144
SHA2569aa5c6f39628a94b374b22418fabfd191fbf2954fcb9012a3c0bf0cebf871b26
SHA51204fb6e1fee2fc5666ab5438e4dc7b2a9a25654b46f64f01b0c6d2643c59feb64c8007a3ed5f6d38b93c285a614203cf1d7789fe4d344f5d5d08911a5be3b9466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c69384b130b80383f8126b70746d421
SHA1eb189dd0cd110027ee640efb7d65d48f808b6c86
SHA256f0f03aad5859a81710c2651465f32fee4f5a6bcc2d737af48395492e04f458b9
SHA512aaa44a0382e7a1a9dd17b90f0d7d6fcbacf9138aee322cf9f244734c1c10efc2a16db95ff5b142babeb96a055c7541ded55d4dc7b76ecc2fdca9e6089a58fad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb1fca3eb5a6df5934b3573f2936fb0
SHA1243b9a62b534c49c2fe5a5934baac53614d1cf51
SHA2565b2fcce2273d2f1ef9a8f0fce7fbab2a0993d34c9c9a66d3716769c69e86f905
SHA512bec631c2c0ac371a5394e8d34dad5e61abfb22437f5b760a07b86a3822bae9b2c3059a63001ea3e013ceaedea592b232de0700322bf849d22167053fd9c31aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee9c2f97bba16e6ca409c583940bc3c
SHA199dcfc7dd5b5c23adf0e3390e1dc93fd81d233a9
SHA256624ae7b3fa197ac340dcf395069411c0a16f75cf826243b74429451c68541a96
SHA512f98ce8b55b0ea27985b4ecf89860d0d3ae436613e1d58f3864d56fa49f528e90ddf9288f41fd988a653a0fdfa12c7ba5d7827329b8bf1b8dd2f491e714689154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af3192abdc730a09e13e9c6ff1972f5c
SHA1349c45b8872d0778c962e50beb50d0b9e7a796a2
SHA256fade66d476559d932e9594a7e47e76253fc9e08d2ad381b413ee4d54098eb47d
SHA5129b51652e0d243a1f1b7c89042f4a2c8b6a29048362ddffa2382d3a5f33c56d24ce536430b22b0be326e67382120278c0c8f6b34dfeeb654f63434a945dfdf553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffd16a0f9f84ec4d21b991177e674f87
SHA153038caba474b7ac31b8b8af5a7dfe56f6ebb133
SHA2564d4e0b315372d2c586a4deef26574161fac3cc1b1fe5e27780229610d4217183
SHA512d658e7f48b4b577dd099b0396fee518eb3e3b76127e6c9d6bff16ff6b9a142aec749f18cf5ccf5c748026dd9c0764dfb9eedeaf65303ee36040609e6dd2671b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589035ffe9521b1fe60084cfbeca323f1
SHA173f9dc59bb6b2e75dfaf1446fbe00809ee18651e
SHA25695d6d30554ddf9273204858518f99195473f0fa8a36c3abf0d94ff35f2afa053
SHA5122e32b1e0e13c056bf3d4c4ea52d31fa7861f8e7ebfa73320ede3a74c82e721d811a55bfebcb36e9b314c9d7d640a774c9edb2044042440645b55f38916e604d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f58dd096eab95008c1e65a680ed71ad
SHA1418d3b8a588d729a563d3c9d8a295eaa72a084d4
SHA256b250d79d9aea87968484082461c5e239dd608d8a37a2211b935af093feb2d7a6
SHA5126c075ad2b9c49819dd1dac490f049dc383d3340efe8866fdaf71aae7c5e271ed0150b39b10e2b715ab9bde74c1262ead7f20e785f687e2d952c53042d981c5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57590ce2e01a8f78d2c806032215deda7
SHA168728520db46483b9118dffd83c8f5a6e7ff9e39
SHA256d09db36b5944e56084a3ede7ffddfedccd6cb7498c8755229eeb44efcb744a36
SHA51282a2c37a5a241524cd2ae674e7a52d140d24613452c4d62c8e565b58cdb23f17b0747b100ef7327f8e1f00283e263ff64ea640d3201b3837986ed197b1ae3440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538d0d0b7d79a60ca712b71b3bed2c56b
SHA10e20394d16d6946dd91fa2965a71a776cfc4ccc9
SHA2569588b6262cd1785d4c33ea08cf73d1822d6537dc4083e7f4a4e4073f70e46bf9
SHA512565cb0133410243271cb1a7c884405111e8084cc13127babdf8514b42f57b4a3595f1bf53193df931c90d422a99945fded79f996161378605e11eff254eeb533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5960979dc8e3ecd95a07b7c50c2e7ef25
SHA1c087b18d815cce33434788e2f27213e5d83fbcb9
SHA2566555fb0caebcff6cd289a2625de949fda243933ee3e637122d478f1f7aa4c47d
SHA5125762e08adc23001a5f1002f1b6843466394095dcd787bbb89b69cb32a97f5efe0abc46601883af50eda3f903a4434c54c02b1feec97e3a7a2efdfc5407f4124b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ddf1030fcac1e3f5846fe6784bea34b
SHA15d7a342ef4d80f7c129971f9cfca455ff3681a29
SHA2562fdf046136c6af764b260713e2264fcbc1b62b9f917659ad8b3f6e858ba17a94
SHA51245247a265e2d218c38e54380de8fcd987816abb28cbf83abd9e887ab6ad4e536d29477c401526fdefcfd4db94ede6fb80a23cb1b2b25af7ec8b3d0fd82ba2ec8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b