Analysis
-
max time kernel
102s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:23
Static task
static1
Behavioral task
behavioral1
Sample
7464e99ed400c1559a8aa68c9bbf2f379b55c718b0ff3c796efb6a2310139685.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7464e99ed400c1559a8aa68c9bbf2f379b55c718b0ff3c796efb6a2310139685.html
Resource
win10v2004-20220812-en
General
-
Target
7464e99ed400c1559a8aa68c9bbf2f379b55c718b0ff3c796efb6a2310139685.html
-
Size
7KB
-
MD5
4e449d205125170356612ce996d29824
-
SHA1
5864f20a99d0f4fd35a4ff4d79edaa1732fd2fb9
-
SHA256
7464e99ed400c1559a8aa68c9bbf2f379b55c718b0ff3c796efb6a2310139685
-
SHA512
a64ea00128f7dce8e07fdbaa7f3b10fe04e8c5c1b059385115582193a2dced8597b5b3d17cce934faf990498f45ac5093d913884cff069e753db9c510942725e
-
SSDEEP
192:eJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLh:YSGabMPvLddLXuSwSTLdlLXugfo2Kah
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c582c226ffd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA0CDF61-6B19-11ED-8CD5-EA25B6F29539} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000da7959cf02fe264b9e689021b80ca3e700000000020000000000106600000001000020000000d37346af64422af7821e548f0145027eed1682adad7c01fa88cfa8011be41ccb000000000e800000000200002000000012e6c8a99d0038ab9b688d8506c541e795a9b176637da3f1a94a4216229197c420000000610c5f8c46524c3072c1ef3f6fd9a47fc5051eef34038548fd4311465baf44a540000000013027570d96979bd39bd21811f02150ab03ed3fd9a83685178b72ac33892b58e81ecc970fd0a9162a03e8b868d846e36c357211b429010ee6ab9a69a2084a81 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375964436" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1144 iexplore.exe 1144 iexplore.exe 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1144 wrote to memory of 1508 1144 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 1508 1144 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 1508 1144 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 1508 1144 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7464e99ed400c1559a8aa68c9bbf2f379b55c718b0ff3c796efb6a2310139685.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1144 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601B
MD57ce0377b2a646eb6dccaac557389f335
SHA16ccc37d9210f0088b1dda67e000fc8e9f2845931
SHA25686fca1d45a8fae7c3338cb3b6d1d5268f9b0aa0b9507acc83f45b6aa7e2350a7
SHA512251b0c3ade9fe6434c61f98c2d03a0fd9f849deaf11c05fd5356365eae6724886861319655471f6276074c37bcce6620ebcc1a9dad6e611790ea2ad438e87ee9