Analysis
-
max time kernel
99s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:08
Static task
static1
Behavioral task
behavioral1
Sample
fe8bf7965011ed2db795c444ad76b6b2873ec7f3e5013061c4ac7512533fe0d4.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe8bf7965011ed2db795c444ad76b6b2873ec7f3e5013061c4ac7512533fe0d4.html
Resource
win10v2004-20221111-en
General
-
Target
fe8bf7965011ed2db795c444ad76b6b2873ec7f3e5013061c4ac7512533fe0d4.html
-
Size
7KB
-
MD5
2d123181fac583865680aae1e7bdb7cd
-
SHA1
5e47a123e768dae1c2dd0ea0e67abb00f20811fc
-
SHA256
fe8bf7965011ed2db795c444ad76b6b2873ec7f3e5013061c4ac7512533fe0d4
-
SHA512
f39598a197b93f36ccbe4c10d0ef81d0c6ef63c4e9ae9f47d1a0e1b4f58897a00bd12ce69ed905a8e19b412dfb0c8ace4998753505cfcae5d6f3990c9f044032
-
SSDEEP
192:gJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLi:KSGabMPvLddLXuSwSTLdlLXugfo2Kai
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80735eba23ffd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375963134" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000065b60a96f80e524789a02dfd5acd3c89000000000200000000001066000000010000200000002db4cea200f7c17adc04af8364a9eeb61418b9ae1154c7315aded6cab0927727000000000e800000000200002000000091725259e3477922db72bfec87fb8569a8a9acf7812c92b36efa03685cf25e4420000000705b335d79b4e2a8c29d1bfe542cc4e58eda28b8c5dc592a6362afcab7cdf21940000000b63512f43fed15e302d5fd8dce5ad5fcd2dca74039e1daeed49085ff0dd36e6cd402f87df3f3cf6112dfee4f16cc723eeb76b7afd66aac7e0c7dc187ed5c4e7e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3FE9BC1-6B16-11ED-8FA4-466E2F293893} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1488 iexplore.exe 1488 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1488 wrote to memory of 2024 1488 iexplore.exe IEXPLORE.EXE PID 1488 wrote to memory of 2024 1488 iexplore.exe IEXPLORE.EXE PID 1488 wrote to memory of 2024 1488 iexplore.exe IEXPLORE.EXE PID 1488 wrote to memory of 2024 1488 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe8bf7965011ed2db795c444ad76b6b2873ec7f3e5013061c4ac7512533fe0d4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
602B
MD59964dda254a202380b66f3296cce1c0d
SHA13074988f2fcac1264b7050a81bd483e0b724375d
SHA2564f3d8bd89f2eea6824e32d8dcd967be04c2cf5bfc8edf926a28905fc0cb56eb3
SHA512c67ebfe836333ab889a1de8f045893c9ebd63bd8696319a0797a939d074270545de87c4323def7ec6acad36e7ec0c34ed6e1f09198467d17e78a7e3f3aea4a79