Analysis
-
max time kernel
153s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 21:16
Static task
static1
Behavioral task
behavioral1
Sample
002d6cd73be0b3d90ab3d83cc71452d9317500043455d5195874fe2fc2e5833e.html
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
002d6cd73be0b3d90ab3d83cc71452d9317500043455d5195874fe2fc2e5833e.html
Resource
win10v2004-20220414-en
General
-
Target
002d6cd73be0b3d90ab3d83cc71452d9317500043455d5195874fe2fc2e5833e.html
-
Size
82KB
-
MD5
61167dc68fc29f9698f02ad296db5c58
-
SHA1
69d73b794125990291bf260d9461640d0fd62516
-
SHA256
002d6cd73be0b3d90ab3d83cc71452d9317500043455d5195874fe2fc2e5833e
-
SHA512
228551523c2ba23a5d619f9dc290baa65d4964122124dcb61951863d217561600b08a3cf55df241f8cf32298aa637354009747e41ab0f1c17616f620b6f66a9a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{392C1221-CA87-11EC-843B-FABB0CD78C51} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000358f16e0538341458b70f68dad1eafd40000000002000000000010660000000100002000000065624dfd8c961d7e58c4ce930cdc1a4a2dff076f0b89b2f7c232d3f289fb8fb9000000000e80000000020000200000001e8e767ebdc5a02571fd9907ba536cb6fa8c898c81098dd1da07b10ae45f2f87200000001d5e0fa4a125a850c56f7942710ebbddb8978117ecd5b9bb8e979cadc89924884000000074d682199db6aa173b672df81cd816855d512d46baaefdce4ed2ffb20d9e8e3c38b72c931503970fb134fc0b822e321b052f678c094a964a2ef81e4a089535f7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "358309243" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b76735945ed801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1116 iexplore.exe 1116 iexplore.exe 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1212 1116 iexplore.exe 29 PID 1116 wrote to memory of 1212 1116 iexplore.exe 29 PID 1116 wrote to memory of 1212 1116 iexplore.exe 29 PID 1116 wrote to memory of 1212 1116 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\002d6cd73be0b3d90ab3d83cc71452d9317500043455d5195874fe2fc2e5833e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1212
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51caef47cc9f353f5d35497f744421ff0
SHA16f589c36a28261f1ea29a2fd4df44ebcb9ff5253
SHA2563827125af7e706ca01ca1ac4a8c6a5f6243cb6902fd66637eeab88a6d71d4b47
SHA512492f542d6befae3ee08831abcbc5df8a205c0431ccf61895ff50339e981ef161c19e6587be290045bd02e1d66b359a5ca9f77548718ed62668029ff649f1322e
-
Filesize
591B
MD5e26a0412c611b2a0afb572fce1d6fcfb
SHA1b1d1a0f7c69362c6f9a150bc370b0f9d606cfaa9
SHA2561f2825517940a57fabcaa820dc35644c8e9ee179303c519464609495f63398a0
SHA5128f2ab5dc5620c63bc987ff010276eb1cb33c31c9c097969503d686957ec48aef6c21fbdc4b952b114d332cdbea0939a34ad52201dfe0fa1cc7b3ee97bc14ab0e