Analysis
-
max time kernel
132s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:17
Static task
static1
Behavioral task
behavioral1
Sample
b035ff3fcba1afbdd1afac1bad3f1661c70e19767dcd204e9c198d23b110b2b3.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b035ff3fcba1afbdd1afac1bad3f1661c70e19767dcd204e9c198d23b110b2b3.html
Resource
win10v2004-20221111-en
General
-
Target
b035ff3fcba1afbdd1afac1bad3f1661c70e19767dcd204e9c198d23b110b2b3.html
-
Size
7KB
-
MD5
ab77e7c3c9d5f4f81a5fb3fb058c333a
-
SHA1
0c6ac14aec175fc081b37867d9d70cc7912334b0
-
SHA256
b035ff3fcba1afbdd1afac1bad3f1661c70e19767dcd204e9c198d23b110b2b3
-
SHA512
5c5c65d24d81bab23a40d1313b8abdca6dff71a82ad384827a95990ef81d41b6eb971ec0a55b3f585393ec1f1626d36a28660224dc4af3593bb7e2a4bc322cea
-
SSDEEP
192:yJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oL+:8SGabMPvLddLXuSwSTLdlLXugfo2Ka+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375963929" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b05a8725ffd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1F05C21-6B18-11ED-B68C-6A6CB2F85B9F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a900edfeefd9094d92167a10186dd2330000000002000000000010660000000100002000000016b010baf185e63fd509123beab372627f5a6559c60025b901945ad66d20e2af000000000e8000000002000020000000592f42146b9fe3d77a3daa1f038b6422a885cf8ab75c5fc925d2de2325a58d6a200000002dbf71a38c5123a4b64b1dafa3a10c8f3076403cec50a5f631a639b5f9e76e4740000000781259d7c25ccd6ff06a6e47f45450639e518c3290a91ea62797f4bdb9b54ea1bfc98527108a8f1b227bb00a8d3b4c2578a98ade6dc08eb0591cbea4306b820a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1752 iexplore.exe 1752 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1752 wrote to memory of 1612 1752 iexplore.exe IEXPLORE.EXE PID 1752 wrote to memory of 1612 1752 iexplore.exe IEXPLORE.EXE PID 1752 wrote to memory of 1612 1752 iexplore.exe IEXPLORE.EXE PID 1752 wrote to memory of 1612 1752 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b035ff3fcba1afbdd1afac1bad3f1661c70e19767dcd204e9c198d23b110b2b3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD5a41fd5975addc17bc1e00b0e250cbf46
SHA149cb86ceaae6f1e02af000f757103dc9206d054d
SHA256655b1aa4be1a10fd74f8dbfe953a0273b4f4d5af7520b95789e8bfe4ce85857c
SHA5127f2cc9c611b5de4adf314b68b83cc2fd8230f8a6174ef20506d7935a4d9bb3c9ce34bba18c46698b92f04bd84c1fd7da54ffcf8ced378343915f4bdf6b8457c1