Analysis
-
max time kernel
130s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/09/2022, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
1IF18uLcPoKs7_XQipQpHZ4hqZ9R3NTTo.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1IF18uLcPoKs7_XQipQpHZ4hqZ9R3NTTo.html
Resource
win10v2004-20220812-en
General
-
Target
1IF18uLcPoKs7_XQipQpHZ4hqZ9R3NTTo.html
-
Size
208KB
-
MD5
ee9d2b36f2fd878a728dc05e82599c0c
-
SHA1
80e013b4eadffc3690f6fb3fe891373026326144
-
SHA256
b4c1716d06a90d9b8304736b6f4306b42e7c2e90aea7de4c6845dfce3f0b3ff7
-
SHA512
78f22cd6ec1320147d47275c9de86e01f35a94815d7ab9b88f19b7bc8d1121c471051b74c4a13109a352475f7e059db8f664eedb48ac1b83e07f530240724d87
-
SSDEEP
3072:LsKnWFegZdEaLvqDEjHQU02uSen+nDQd9JinD0Tb:vW4gLLvJzqUXnOb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{355BCCE1-400B-11ED-A964-EAF6071D98F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10da921118d4d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c000000000200000000001066000000010000200000006e27e71925f0c60a17ceed0733ff522cc245912966f1260ca00159bb2a2ef123000000000e8000000002000020000000a65dcaae5f65425e0d1bb3e9a5b8ab1cd94fca95a5c12beef37f2fc808301d3a20000000a8176a7d8733c9dc38ab7d598ae3b60f6b21e1041ae47c966fa30d3ed11c7cb540000000b31d9633c048c47a50a16393b1b913b2b08c8a83edd25c92fefe917049b5899e2cf49480e1f6a1fb06bae1b40eb8452c967950449339fa53409f81dceb355f01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371230216" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1248 iexplore.exe 1248 iexplore.exe 956 IEXPLORE.EXE 956 IEXPLORE.EXE 956 IEXPLORE.EXE 956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1248 wrote to memory of 956 1248 iexplore.exe 27 PID 1248 wrote to memory of 956 1248 iexplore.exe 27 PID 1248 wrote to memory of 956 1248 iexplore.exe 27 PID 1248 wrote to memory of 956 1248 iexplore.exe 27
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1IF18uLcPoKs7_XQipQpHZ4hqZ9R3NTTo.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD53c63c29a60419a2e117bcbd49c6800f3
SHA1b7ee1081ec33af3a22af501449195419de16d8bb
SHA25681f9d6ae0bde5cbdfb0bc468bda63f60a8563598aafd201a9a64ff760ebc915a
SHA5121027320a343d115c543fa717caa67e9f07db4045daf9f922d299e09c3ea7559251cbe26a2de5ecd60a128bfe5ad1dc6f7616e71391d29c2c82313fccf51ad3f8
-
Filesize
601B
MD572804ec7304dcf35bb365362a1df34cb
SHA10087d80d40f3a93a9b60b34aba3f3a51d0f7cb38
SHA25654114a9683ae648954debebd5ea4e0e8d686ef8f5cdfc7b46ce3f34c41997c90
SHA5129ec50969728440e87dd0757cf0169e35b43fac387cee99fa2fde62a4437d200dd55f252eb7f716ac025182ffe67876d8166091e8e567862114204c71384a1df2