Analysis
-
max time kernel
67s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 16:55
Static task
static1
Behavioral task
behavioral1
Sample
COURRIER DISA.zip.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
COURRIER DISA.zip.html
Resource
win10v2004-20240709-en
General
-
Target
COURRIER DISA.zip.html
-
Size
216KB
-
MD5
c376c5c91c3f93ffb913cccbe09949e6
-
SHA1
4331d325bd138c96fe8c724e150ccf2d53f296c9
-
SHA256
2559caf1cc1e2fc03dcc6d87bf683a2f8f8e6c3b3f4ec65009dd09c5b15cd5a9
-
SHA512
bea51d67e36c2048ae918ccd6fe55a06bced1bf63543f333f6ad3d6d904abf55f8844582b776dd53861c8ec506f1265eb968c87a9c5ca2824f2673211812cfab
-
SSDEEP
6144:bKJ8Rd9k1aSYUr/VO295wjF50DVp7Rydcy7OGdZ:buc9ky6f9OrIvJ0OGb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F9DB0EF1-45EF-11EF-8FC1-C2666C5B6023} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000d2e0bdc36a4d04badab6c1cd74ac13d18d81edfab1affa112a888ea154df7b98000000000e8000000002000020000000356954b1b85cb940c72bb642352544b64c5da605f8fa65c537be49b57d941cf220000000470cac393e08cf92d0a2756c550f268aca8f5dfdcfa53ace4c510559262c9c9240000000b0aaa3edfa0105245e3e3385db3509b8d3c816121dcc244624ca3d542b71a9fc33c926522761368f170998fe3415b3b59b262d7a592fc75214e2b5bd76f1f9d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0545dcefcd9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427570114" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2588 2864 iexplore.exe 30 PID 2864 wrote to memory of 2588 2864 iexplore.exe 30 PID 2864 wrote to memory of 2588 2864 iexplore.exe 30 PID 2864 wrote to memory of 2588 2864 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\COURRIER DISA.zip.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f3dc8cc0fa45dfafa34d96acc714f014
SHA136541c90f48d1c15560c05ce2e659dfaffa3d66b
SHA256a1f36bcf8adb365e29baa31325dd394e6b5ebd4f2cae25b38e5ac54d0a21374c
SHA512be9e07b959752229873dd238541d30052441259519f8ec95e27d09792325aea31f515ee38f328e235b95ef239ce7a4797c4e8d2e57a9c26473d96314e81f3571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD506155712f5e288c82f15969ade69e986
SHA1aa3e23ce4fdb72739d9a71d452e457702569226a
SHA256d6d60596e5ef02edc091c66048e61a184d7227ffdb1b95f1aea56b82d04d0c54
SHA5127cd1ddddc3cd31a1c446f7b31769e016d6359121b9734e1c53c109c3c45f20c6ea04173d28962bc4fbe6e90b3cf96e95f18227e9bc62234364d2aacdb12379c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57e8f61176bf3268c680f73680fc16166
SHA169a49f9c1f1f42781a1db0a10909279a8342dbda
SHA2567fbd3df172753a6ae99aa1c020f3685b9a9fbbcedcf304e4d955c9796599e213
SHA512e4fe3628faef7d3e64b13165ffb6144c4f66a23142ff593367ca58373f178a3f83e88b9eb08dcf99c286f8dbef0991bb5cfb623e725bdf3a9670bce35e94b091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59144fd3c8dfb5d9d59be39a6e2df7a3d
SHA1eea89fb6b342badb3defa9e34b1e0204dc345a38
SHA25657a1b4c17639c15b35440cc68db315d43cf74cf3e66efe5ed591d6589f04ec58
SHA5125a4a9d8c9fd776a500bb947efdfa25735b2ba295acb1161cd953cb29805ea4e8607b7d564abd00263f971a1d8f785d93dab97e97eb7d0a9fd012616bb00674dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5affac5e474819aacb997437f96e435f3
SHA1dd77f53a3ec0d65e51c45df44b466b4bc4c30375
SHA256f3e083973d1ed2560ca166040dd711e3fc5e0152248c2b9deb650bd4c09c9e30
SHA512cb21d6a7833040c71c52c3f0d4ce9cb31d759e6a7c407e60f4b4f8e6af1efe2cc51c842851a5b636ba9bb170709ba00d732b6117b32c8119583b35d1ddb0f140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5df32f4f41d1b9d387be11809372d4c2e
SHA1b8c84df72946d6a3548edbc6d461aa249c6334dd
SHA25647ffa3ff93b54302d15e00ccf2a9e81a56f12d47998fbf586e1006773c75b8b1
SHA512ccae11f4e55b53e9d8137c53646ec4122bfece3de6c50e4dfb194657047de652422947080d8426a0e440ddaf758da0b3f5bb4ca0e15450898c0f43dc70d1b6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f72502dd26af6a9e2b19abf02069d50c
SHA15714cbc2a1101e49e98aa24cada12049c51d6cb9
SHA2560338e3fe14b0ce18523034e3be15e7b96d5b8d2514acabeb74dc793a176a153c
SHA5124f1fb80e35afe4d73fdcedba37c31a433e718f93cc42a11cc13f1d7a380bb2551b33e8bb7bb73503a42a7d32be1928ddde3c4fc4c95658a98ee22b158707832b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d49f0f9a50ef42eebea2f4fe119de178
SHA196975c4306d7c70fdf9fad093bbad10edc6b4696
SHA25638b954c2c20452d769240415aab6f11ea9424962f815f7d78bf9e9ea51c691ad
SHA512d9a8191a7d78853ad967a3a5e0ec2470a7f9c0b5feb9c708c71933f49ebb145e5af60d6989150b1b05cf9643badeef6d2e453d6437263dcd54fead6becdb49ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5866395a935da318ed36b860aae49cf70
SHA1adec1ee0496431ba36d93fd78acef9a21a80c371
SHA256ced86838f78fb2df2e54a222125513b634ba4b3e8366cf6bf9a6bbc47dcca1ee
SHA51231626cc1c07cd9fb6146fdc5c6fe7a75df057e9a2437aea978cfadab0e8d538231142a0be584d6ccaad3b77f4a5719847687e380287cfdf16b981a94021c48f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cfbacc6bcf89db5ad5e830915498a1c5
SHA1a1cfe976bfd392345bd6ba5bb0572e437e1ff2c1
SHA256b57af04bcff115aced6f51367401bae662e06cf0c1d2c349c3af55d3caa9bfb8
SHA512d84038b818e67f37e4fc3fd206c8e53584e4548b082fe8bcb96223643f4100b9918fdcc42e982d93c809182cb9b78946aa8f78094ecb82165792b10f514819c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57ae446282daf48f192db36c5ace98372
SHA13fdcbc0bcf6a3d60724efe8b751d01a6d23512b9
SHA256abb059829654dee78dcde2fa45668a2dfb3b8542182a40f90b18233510ef1f25
SHA512d4db319dc63253bc62a4a49c5927bb34f0219feabd3780680c87e3e7ef23df582819cc85f8466140af82c27772bbd593dcf8b990b41a57207a5c03e4eeb794b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53e213292e2c8beecf57c3a0b43cbd3a1
SHA1679f80c22710e1a95b7247d9d3e1ddcc761192a1
SHA256818fdf8ad1c2c097b6da74d835ff85ecbf6a7812d052758e770f763aabd5aae7
SHA512b373922320cea1e9da4cebad9f215bff915192b8fed144df64c132c17beb7a63d55a1ca9b92b78ee45393f6f0ba2b54831f5ba7779626260db57c599a8ef802c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53c81a099c6f19ee847af2d51cbd82dd0
SHA1342cd093f426237b26939d9fd9e3204112b46cbb
SHA25635b4ae59f039d41c1a5fbe07f24d5f39578f434c935bc9a17feeaaa06ef72555
SHA512b55e021dd89b304053fc2b2e427dfdfb6366bfd324240190f0c5e896bec2b78de53a9e61bf0a3757c5df232357abaada9429ed60babca8d7fc7ed3dca4dbc173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a864ca052f08801b1d1ba69671bf34d6
SHA1fff886d79838b0263460bc6eb1a808995c4d1265
SHA256c60ebd481a5a675033ef652b8cb100897a5c489e2a5a78fba70b8b0e0a7b8c95
SHA5122df44866668379de057a53ab1e8b61dc2ba132beddb4902621686b7c3d3f23d58f7d52703bf28f8aa01bdf0603eb3614c1211cf6f213d932b153d36d7e181a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52a57e0dbd87f83fd72f2daa9b840fa15
SHA15e366b31aad95b94156a88895460169d4470244b
SHA2564621c46c512a136dc225c74c740c123b2f8c4147351f2dc9654139fcd4bb0437
SHA51235227d8d0354e849bd36d5401f4f09c21b909503ce3d397c1889d8a85521ed42a6977983b87f8d35b39d8533ae13bfb4fe73675f15446351a31eb09bfa392276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5429c4e66962ca31158f335bdb59058d9
SHA1bc672431dd47e4797b0b81ae8ba15942f76150a0
SHA256a5a9187bd8453d270c62a89cbe9a0d751241c956a1a43a423211f1bf127eab31
SHA512bc95b131f594a2210be98464737de618ccc652b3256c75743b77ecf37441f98555e5a9a46d45955776751c549e138d572481e8ad460fffab6ec0c0ed5b1adbda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ccadff5cc113fa54b20682b0ffb60c3c
SHA19beee9510adb579ab71049ba93772430559b1565
SHA256fd0b01424671cbb94566850e3764a16229c132d15c3a4e6b91048953323144cf
SHA5120209a716b959eaf37a4eb36566505fa574f86d0ded6b1a305df8eb8bcf4f3d5b1c859f83da644857c796db7f773215b76c8cbf1e6f49e1db5e48ccd718d438db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52d16c5db03a65712e2aa84b00e38f138
SHA12ad7992b47972dbdec878f13f441c615e8550af5
SHA256516259128ac13b125d659d3b542aa45bf4d8bf6cff7a407571f817ba32e2d80d
SHA5128c1a9316981fd45051b9c162e432f479d76bae42cca827bc65df02adcd45b602bf8e562a8cb358fe1ed6020d48faae6c0c3dc3d52a7dd978bf9674af19d2cb08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD523b29022f2f54056fc57be11c3e4864a
SHA1a37e16ec43e7abb18e6defbfe37bd30366766bb6
SHA25684a782cf495a3efba253f7f887f32ca16c9d0f45ec69e9296b5a191fa354c955
SHA5121e658f7b17e1b270f9f510f5ebd30d25cdcd40bd362520f9bbb237ad113e2331787d14e5ebcf6b62a9f73c4e935271e99572e650e25e984e81bf3ca5e7ab1503
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b