Analysis
-
max time kernel
841s -
max time network
842s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 16:09
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240221-en
General
-
Target
.html
-
Size
2KB
-
MD5
9d8db610acccdcca2d5cac721bb636c2
-
SHA1
5fed6797125e83219dbb6fc0db85c03c90c2718d
-
SHA256
112863959beacd71fdafef563da2a455f70d0da95a367f65f291c3692aafb4ab
-
SHA512
977c26677dee95fea9e7564a1cc03c828bc61c732ff18db1677a88566a6a6a821cad1e9e71d950de809d5ed7f441fdda510c87dadf37abdcbedb2fbfdd5a5a91
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001b3b1c335521b0469d638068dc98064b000000000200000000001066000000010000200000009386cf715fec4d6892bcb2abfaf43fdd41a49ab1cff1abb6e32e7b39729ee758000000000e8000000002000020000000c9355ce742fee53da933413f08ddd98fdc28e7d9f4d7a24e900de4f227331166200000006a2ccb90a9c482a7317e9ef9b78f5443acf48407ab5c8e814bbcc5172b68ea8240000000e9774f72c5d59f2fb8c386c563339201342dbcf74195844f60ad0ddd80de83bd04a6b3a5d36654e481d048229eebf8d5efef58c794bc624443acd5c407369625 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B1666D1-3956-11EF-8442-DE62917EBCA6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90909e6f63cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426184828" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 1816 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2220 iexplore.exe 2220 iexplore.exe 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2220 wrote to memory of 1816 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 1816 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 1816 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 1816 2220 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56495d37977aa38ead619aef2f91ca332
SHA1ff58b2169abc0e6a67eebcb279070c8ce3833c9d
SHA25616bddc442ffeb5eb19f654dfb3ddcd5052d6608ed96917a793bf2170d07f8950
SHA512adcb5c6246b7ab471d491f0a168129c37d40dc74ff38597b6304ec390f0a6da423c665dbfed027997bd12db055f1fb2c2288ab474e450a966ee0d5672030ca6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5de612dc1852dc6e79ba74cf3c3e9f707
SHA1d2816ee9e289c768b0e33fe361d791a1397c8b42
SHA256245a7e44a5a48967ba031165180003cf72f5ea36a9e0ca2ffc81c4eff0be631f
SHA5121f05117a0f1c83f5e29c35c61c2cf07a7435869a31357ddc7dd32ec1a4ab9b81c26b998d11d1bf2ffab978fe3f95555731ac17941d39eb6e3319fa16b7cf463e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD50c9561fca76f513cf67ad213a5d847ac
SHA12b2230021ab82e061229875587c7dfdfd680c3a7
SHA256c5e94427e4e5a8d3c84ce4174724625bc6e67ff2973e0fcd922eb3f4cb9a4055
SHA512386e4e58bb2bf1057a3a418d5eac3c635ed5e5331f1d5cf4c8f8783c2888d522bb3db9da079553ce791d0501df9a3a9c0363e73e742bdc035a4028df57fdd094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54d3729735ceafc12a67fae55144416e6
SHA1936b682bdf681b3eefebcc5b181d26de88c1bd7d
SHA2569607fb0aae4d36950c89acaca811c01c0189ea8cc59f6f1c992cc4653d43717a
SHA512db09caa8583cca49551fc6c920cb8aee7ed6fdc5e42226d6916b414a46db5e75a80cbd9edfb2116883f40ba335bde7a069e7fb4785bff73fbaa7fdfad3338b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD599fcbfb8466b689137e7649790be0ca5
SHA19128fd6c56c09b8c8189d47bd4ff76b40b7df2ed
SHA25650029388b023937f7cac046441db1d1e533e6843209a24bd16612af71b837545
SHA512e2d2e77cbc37d4b510855cddc74d58c7246e43d82643e3eec3890ac80859f0585f1d7c2015a06e7dd7f629b65acc43076a8d8e9e794ed9dc87263a0377b253bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e1784abfa64f82fd01656d0629f64fd9
SHA175ec5de1f2e9ff259498e80689c9cc9cf3b2599c
SHA2564f520bea02c2d546d1c05264515aaf65a7e62385374b60943b08ac3f9cd3a9ba
SHA512e41c942db2a47d0fdf4a9d11eba95f594956b31b368d7118d5629d25af7828f01d10edd34a0bb3804539e9f5bbacf3b765480f4afa158625cd9c779a14ece237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD58f6fc4f4fa34fa264c60ea40514cecc5
SHA118b1e87e7e1c5eb648b529ca9538d0a5902ccabb
SHA2560b03ea6a0bc679bbf6614a4e671b02c16853cb5ce1ff12d0ed12577c9928cc87
SHA512004e3fdd4092e272e821d6316b858f7312d62f23e97480a15b4436ff9bce3e2c9893ae97e3b1a4a07905d8d9c7304870b8400bb80327423862a837e130704eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD546165df393ec101b0c83e249cecde15a
SHA1461e77297942ce63df49394003f3345762fbae95
SHA2569227a1c453e354bff3fa41671fb7ff23ff4e22cdc23865d46925b5a68d4bb630
SHA512fd64ffe6de24eb1dcb2f882380f104b7480a448fa5fa4561ba2f5fe6e8fb58c4130d457e4c73967fb96217d18d68aeef2bb7f87b01f7261ce56d54ef4f6fdb5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b18aa0171bf41cf17f6757777cf529e4
SHA147bb409526716b16450c895a22189d6de3b58129
SHA25693a00f081c02b4a1c9aeb2ef72bdae6d2f5b9a7fdc78e2b03c86090335478aaa
SHA512e4b19d9d9e7fe58aa9e7e145eab295c2432dcd0fcf787bd7f899b8d075d7b8e1c6e7d2b285bccd6deb786f874982313c92d8cf28109e1abc5e9cc9fb64f6209a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5bb7483426c4441dbd6f58c3e2a059f02
SHA129fd4786810311562a3cbdeb048d7967e90181bb
SHA256ba600b82ed7147fbee870cd8ea09d0ab58aa0e0117674d5d0d960aa3611c4547
SHA512fa99ac11999320d1644264775ffb390f230c861eae95dd1ac939ae5d3d354aa046910a9539a5bacc15cdec2d5aa15c2956127926546b33c9d43491429f70bcc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54bf297343402cabfc5679ffa09742412
SHA14b738d161d8b2ef7698ba440a5909a15e4faeb89
SHA256776285ac8753621a3cf91c4afd96a5f6f414031a500682b2d6401e64547da881
SHA512bd4c4752de65055147829a342fcd1f7c97a38e0404133b405a77cdf4e4ed7f02f6d736e11f0e9daba14508cacc8c08b118a1d6b6272703111f2155fa22a1bf87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5cc8f4e166990f190ebe4684bfbf063e8
SHA1bdcd4c6b5d51476046eec6f82fc715391eba9028
SHA25636423773793aed1814d74a319d07afd028a0f6aae74af83cc62b61c26265509f
SHA512f0da1c04dc3ef0d1289fa2c34a576467797d052d1a799f80df7624757fb9ea64eb4a06fa8830468f67efe9b6cd14e22d30af8a79173a916719b5bff4c8317b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD547b815b44bc15b5bb0fc79dc86bfd70f
SHA1c5bed9a29152f45f7abb8d7a6ca8bfa5c65665ad
SHA2565f1dfbfbdc9447cc38874e6efd0b7874ae4bfd71a074555e919bf091b00e1048
SHA5124e38a19b744e0fed3958d9dc010e35eeb380d1c1dd0281086e80f24c57c7483e464a967a8af525e2bebed8a73a09165a9976fc7cefc80b37ac3eee5edfc5c337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5592b827def6bc408c77a2d0d08430d52
SHA1a73d291c1d319151738154fa2fd8dd072639552a
SHA2560c2d3c8022baba926003056ef63bf4616a3f881dd839cb8052d4df7acedbe33d
SHA512ae3d8c98d695f1c150fe5fa7921ae55e4c578b1e5ee3adcf134407796f1fce19c7fd0f6d5b284c75afad14da30ae68667bee331b1c5e0f375b03085efc6da645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ab909b71d3d4f13382582ac7731bcfc4
SHA1b6b6edc3b9bcc5293764de35902c31a1d32398b4
SHA2564780722e6754cf7d09c795f1f2a8355a2082d8837bc0fb08e73ee17dfec9a05a
SHA51269e211e854898757a8e8226e81805b3e7652e1978c5fd28bcb151c9e1074108b27e43ecf686b289e773089022d0fa66d6fe14444509444445fc1af124c9873da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD599df2393ec5f75934b3702a2d8d960b8
SHA1f6d5ba38482a63519a72ff546cfbfe92a648c0f2
SHA2561a386434d2f9694a7288bd1817b1549e87323f6aa66312c4897d700d28193bd9
SHA51233cb2cd1eb7bcddc928125eabe76110eb15a0f2caf391d85194ee02a861a51f8ca4124337b49e9b1cad1109dfab41bbb790ccfd1c54679317a370c134f1ea565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5062176e0650d2d51ff0496828c32ec2c
SHA13462651161abcb85cca6627a91e855ace6607ebf
SHA25651f8e24a16cfc931e0e6a1fa65127ceac2846c4a966d6452e281efbbccac47bd
SHA5123d84ec38d151eea4c80569d0abfbbb1b28a4da61373ae0a8087b6490b46ae738a50db136c2e9396f0e588a707721343a9a02d984808fb0f6d7e79fd5913856f6
-
C:\Users\Admin\AppData\Local\Temp\Cab398A.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar3ABA.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b