Analysis
-
max time kernel
156s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:18
Static task
static1
Behavioral task
behavioral1
Sample
a2c68181ef6aa9f5a0bcdd7c0d2d369ebc13b1dec0a48397fb6b52999877d0d8.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a2c68181ef6aa9f5a0bcdd7c0d2d369ebc13b1dec0a48397fb6b52999877d0d8.html
Resource
win10v2004-20220812-en
General
-
Target
a2c68181ef6aa9f5a0bcdd7c0d2d369ebc13b1dec0a48397fb6b52999877d0d8.html
-
Size
7KB
-
MD5
0cd158b1732e2903cba50ecb48765f49
-
SHA1
dfcc3ebc89fd5643b057f16ef6b89a60116278cf
-
SHA256
a2c68181ef6aa9f5a0bcdd7c0d2d369ebc13b1dec0a48397fb6b52999877d0d8
-
SHA512
c991a9e464cb17b5c147f2098d7f7b06d7f025a5e44630dafc7469c25f0a56eec93e6ed3d684e48af8a7b09156668e47e662269235466381077948e82f24e058
-
SSDEEP
192:3JSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLl:5SGabMPvLddLXuSwSTLdlLXugfo2Kal
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a264e525ffd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375964081" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BEFC211-6B19-11ED-8B55-6651945CA213} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d33552cc820eab4597b3171a526b1fd3000000000200000000001066000000010000200000004cf1c71d968f64274187b1f21e621f604fb2e5cd90ffa390a67ac3657b192407000000000e8000000002000020000000f457dfa24c78b30a02dbf90c8ff4c46ecb7a183bf49ee4674625bee128e7dc80200000002aed6edd929c317bc9355cc30f28afe5359f5fd735f3a76f84d8925ca1478b6c40000000111dc477ecea76746f2fbeb812ade1042cbdf899a2fd9b63b733a626ee20f2362096eee04d784d0a8263e2d6fcb2be220e9e0eadad22d1db0f333ac49a729a84 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1144 iexplore.exe 1144 iexplore.exe 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1144 wrote to memory of 1872 1144 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 1872 1144 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 1872 1144 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 1872 1144 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2c68181ef6aa9f5a0bcdd7c0d2d369ebc13b1dec0a48397fb6b52999877d0d8.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1144 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD5089dc8262f998322c6da4e18de9fb9b2
SHA174a14a488fb4bd736d7eb31199330cb686e371ed
SHA256bc1ac755ba1a0744ec9d5ef85df4cbab63ec2ee079678e5c103e28883c998875
SHA5122f3cd9ed99ae49ea58b8e54f5e1af69f238c4f4b5f54984a56937e54d72e005434eeb6909fafbea05da85f00e6b2780605d4cad74ae168383dd7519467a8db89