Analysis
-
max time kernel
105s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:26
Static task
static1
Behavioral task
behavioral1
Sample
57efa1c5765ba55b02e10d991689642db65572c18023916ad0ae33948b84cbbd.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57efa1c5765ba55b02e10d991689642db65572c18023916ad0ae33948b84cbbd.html
Resource
win10v2004-20220812-en
General
-
Target
57efa1c5765ba55b02e10d991689642db65572c18023916ad0ae33948b84cbbd.html
-
Size
7KB
-
MD5
b17a29cb60724747d6ed5557577dec39
-
SHA1
d713801f40c385e35416820b022db63b54442a8f
-
SHA256
57efa1c5765ba55b02e10d991689642db65572c18023916ad0ae33948b84cbbd
-
SHA512
f8da6a62c9b2a598183cb83aafd51eea1bcec120927559aaf1c9e12430893d09172800ec8dd41b5b3c69b2bbb3ab99f34058c146ac3bf5eb07b53c187023550f
-
SSDEEP
192:sJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLm:WSGabMPvLddLXuSwSTLdlLXugfo2Kam
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375964621" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000064e9a4ebf2ab224bae6c2d3caa93dd9d000000000200000000001066000000010000200000006bb9f17d0e5229b8d46d16cd79663cc07809428d939a6e315cb9e3d25541fa8e000000000e8000000002000020000000813212aa28e640fe2c9e6bdc25000b6bb533700861ff42e8ea4d551dfb8df25420000000f2f9a4de9b66687307301e4dfbead27b17dcd8259fa2d6fc5de78c4e5b500ba540000000090f6ca89a21cd2f0751ed8e3bdae6e8948f35949d444d26e8aa0cf7d71cad3ee27edba11ab1374b20cac07299c1a4600ad4b399b4f5c73fa03bd51a41e16934 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5794C251-6B1A-11ED-B51C-6E705F4A26E5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d36c3227ffd801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1504 iexplore.exe 1504 iexplore.exe 800 IEXPLORE.EXE 800 IEXPLORE.EXE 800 IEXPLORE.EXE 800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1504 wrote to memory of 800 1504 iexplore.exe IEXPLORE.EXE PID 1504 wrote to memory of 800 1504 iexplore.exe IEXPLORE.EXE PID 1504 wrote to memory of 800 1504 iexplore.exe IEXPLORE.EXE PID 1504 wrote to memory of 800 1504 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\57efa1c5765ba55b02e10d991689642db65572c18023916ad0ae33948b84cbbd.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
606B
MD512f1fe3df1917d7a755e602aae93bedb
SHA1dc42e1037af143bd8d2eb8cd81916c389a1c1a85
SHA2564602957ae8675855ac6185895099b7d86260af06c874ff056485117786277c26
SHA5125675b90907b766302907954a536ff4bdaf8731c661b12a2a52f830085658975b10bffce2f43b516ddc79a4eccf0c651d64aafa2d56fa3b2a1596d6d507921d63