Analysis
-
max time kernel
122s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:18
Static task
static1
Behavioral task
behavioral1
Sample
a57013f9802e7523f82ffb5293253c663e0e3e7e4a32ea696e989d527ffb9262.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a57013f9802e7523f82ffb5293253c663e0e3e7e4a32ea696e989d527ffb9262.html
Resource
win10v2004-20221111-en
General
-
Target
a57013f9802e7523f82ffb5293253c663e0e3e7e4a32ea696e989d527ffb9262.html
-
Size
7KB
-
MD5
7ff8da7a10b4f007351eb535421caa43
-
SHA1
477de35d5f9a995c0b05beeffb90ffb026615a72
-
SHA256
a57013f9802e7523f82ffb5293253c663e0e3e7e4a32ea696e989d527ffb9262
-
SHA512
12ce7660039688690da338c0c7a7ca3f0d233e4a201c20b0b2c7eff5b8a88d9099789d247c50be377fded804e1f7b1323d8cd2f005e51930a2b86a3fa9d87f2d
-
SSDEEP
192:4JSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oL6:iSGabMPvLddLXuSwSTLdlLXugfo2Ka6
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D76A79E1-6B18-11ED-9332-6A94EDCEDC7A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000413d99a1de0dbb4d94b0586e391f8ad400000000020000000000106600000001000020000000bb15dcd4cf2b460846a08d70b0e0f831ba4d3e2e507ce71fdbaf91bbbee5f8bc000000000e8000000002000020000000df6da6b7603588c6e4be9216297258b69e4499f5da5bf773b4489eaf7e02972d200000004de9b82f867029c1d0832674ddc469d7eb5183a90d481b338b8ea6b4c315ab7c40000000912d0f3a56767b5fb042887ed0c448b8c7cb815397b5ec3a772bc8f829bd1564b1cb6eb9c3ac91ec2f27e25518c428e28f2fea5415c0fe06d3b17cdadf80716d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0197cb225ffd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375963994" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1424 iexplore.exe 1424 iexplore.exe 940 IEXPLORE.EXE 940 IEXPLORE.EXE 940 IEXPLORE.EXE 940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1424 wrote to memory of 940 1424 iexplore.exe IEXPLORE.EXE PID 1424 wrote to memory of 940 1424 iexplore.exe IEXPLORE.EXE PID 1424 wrote to memory of 940 1424 iexplore.exe IEXPLORE.EXE PID 1424 wrote to memory of 940 1424 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a57013f9802e7523f82ffb5293253c663e0e3e7e4a32ea696e989d527ffb9262.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD58f089d25ce95e77dbe7a64beb8f4808a
SHA1a66c9ec997627fb569e8c779a506607311b21f7c
SHA25668725aad68a2a9ea4437da2b786ddfa89c6bb258b1ca4f0b1bfcae151e9591f7
SHA5128cc6b054034be73504d36b117638852e9289ab0be323f637bc5d799db4b179624844625541cb574a2eb1e604e5bc64ef350a4db53d1fef3a4277e4aad826bf20