Analysis
-
max time kernel
68s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 22:56
Static task
static1
Behavioral task
behavioral1
Sample
♬ voice0989876_3-2(3).htm
Resource
win7-20220812-en
General
-
Target
♬ voice0989876_3-2(3).htm
-
Size
178KB
-
MD5
46dcef1896d3b9c146baf0bc12bfa969
-
SHA1
9c5193836731c38f4b2bd61096e8e175d0debf9b
-
SHA256
ea5e17834b9a7675f1856bcb0a7227f7dbb25a46c0f50afdc491b5fadafa6127
-
SHA512
9600abd9efd42f55062f15cc8dc8ef3b49dea878b40c6ea34f980871cf8a3f235c0231729ac7222d4a1e127b306103d42556c07f0cc7310d176b5c707ea99ff3
-
SSDEEP
1536:TvoqwrUP5DHU7c7TcDEBi8kNcuSE+LhI/+fENM6HN267a4xopKD9FMN8:ToPgPRnI2fENM6HN26+IB
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051931eb5747b834197b9ea7bb6adc89f00000000020000000000106600000001000020000000244f7fdab9a64aba781671607f48e6f42734639095ba81c1e1455313d188952d000000000e8000000002000020000000cd9eb4b4cebc5f391d975587de36285fb609c1c76015f2c331d9c3b1a25f438a20000000c872a9719a9adc3a140528056ad90bb5459b0ae50e9196dc365cfe4c055ff0384000000008577ffe05ea41466f48de76f750e44107fe5695609c961d23b46f5b2a214344f208c0ead0f0bca7a7825e1884e3ff96fe3ce9c6ca9a744b2d575ce3501acc0d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3020406797ffd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88C341B1-6B8A-11ED-B4E9-4A12BD72B3C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376012802" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1416 iexplore.exe 1416 iexplore.exe 936 IEXPLORE.EXE 936 IEXPLORE.EXE 936 IEXPLORE.EXE 936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1416 wrote to memory of 936 1416 iexplore.exe IEXPLORE.EXE PID 1416 wrote to memory of 936 1416 iexplore.exe IEXPLORE.EXE PID 1416 wrote to memory of 936 1416 iexplore.exe IEXPLORE.EXE PID 1416 wrote to memory of 936 1416 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\♬ voice0989876_3-2(3).htm"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1416 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8FFilesize
7KB
MD5f739b394d30d392d8eb28922bf5a7e12
SHA178124ad341a0e03ecbb7660011409767e6678fef
SHA2564fff638b8a8f8004eb7a6f5d71ba702373ece50bbe85f499d00d09e7c86dc543
SHA51248cf40407485d1a22f728220a64dc15e85cf051a44104019efa868cc7fccdefcfea2169eea8fb72be819a8c67892aeee72fd22deca31b8bfbd3f8018e55e215f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8FFilesize
232B
MD5a3ac33884fd511449b76bab2689e2109
SHA1e1541bcc07e2549aac25ce89d68df17343f6a0b5
SHA2567cb31fa2d3428a20aa7a12b53b0bec4f0f4fab5725d4cfb423f0540a14ac3611
SHA512871c53b005e8772519005234b3f60acc2b93c7dc8abf1f68c65abfeab3bd4349d8cbcd148c8bcd3679a77d7a1acef62fcbbec6a801d031a2cbd173cf6f0eabf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5292404a1abdf26bf1e78941f6a9fa534
SHA1e5350544797451129ea2cb713e614d5defdb19ae
SHA256b541bf6098ab4818eddc9cb30c0f74c97bf6fafd23729fe43254ba47d2921456
SHA51296c8315e6dd3d22c9c85f19c56ecb7be1e6813fd292f1103ca9a0d4bdd2b55eb9f94ca573b143a2a48e93a9a0669ade5a6cc2945ce3e06042855b6702fc977e6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4YKHHU72.txtFilesize
606B
MD5d4b232cb972a60d315501f40c7a2194a
SHA14565c5f277a42c18679fe8e27967f53171810529
SHA256b29120349e0e5c504b3b51a9ea5f3c867ccd890c3b8e29b3ede61cc07dc96183
SHA51274792c54ce5faf74fbea293e95aed3e00eedcc602c8698e3cbcf3f953a23411cecb82abe6e0b180971d359cb28cfbd6ad16bd3fee5203b70814ef450eafffa09