Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:25
Static task
static1
Behavioral task
behavioral1
Sample
5d3f5f27676da07ee13aea09ce5c8daddf3a45cb5ae72d12000fa68bf611a20d.html
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5d3f5f27676da07ee13aea09ce5c8daddf3a45cb5ae72d12000fa68bf611a20d.html
Resource
win10v2004-20221111-en
General
-
Target
5d3f5f27676da07ee13aea09ce5c8daddf3a45cb5ae72d12000fa68bf611a20d.html
-
Size
7KB
-
MD5
5cb8300eaea32df3f1d2002904e04315
-
SHA1
b8815d7c9cf5d93509c1aa8ca2dfc40164c7c034
-
SHA256
5d3f5f27676da07ee13aea09ce5c8daddf3a45cb5ae72d12000fa68bf611a20d
-
SHA512
8dec3fa3923837d3273d0fd8f0f212e0f3064aa6f47f019ee87ac807f2b418826a3f15873701c731d7319fa31c9a6cb035f88abb17fc1ccdc4aee5c8fc1efae4
-
SSDEEP
192:zJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLdc+:lSGabMPvLddLXuSwSTLdlLXugfo2Kadz
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702b1fd91effd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000664b5ad7f236a473638a1ec74f46c7791c44be90c95b5d154a62fe8e27d13393000000000e8000000002000020000000e91e6edcb8150da324cf7d7f357a13028cb7a38c60a05ad92ce1e616e29e9cb020000000ad9985e8dfa63bbcac1d460910f07b0c7a193007842c21ee3c307dd8be1a9c2a40000000675eb29515ad68344fb5df3b410cd39f067dc83c9609444eadb4c9d05b6ccead4cee17346e926471ee7979799f7f8b35cb4e3461c8ab237da195455f485d2bb2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375961038" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000e114452d47c1eadec57568c82baf100828303b1efc86785af61db885f2f9c9ed000000000e8000000002000020000000a59093a1c98a294cd745638afdb320b5283742dc2504c9afae919729c8e91bf79000000045e6debd2153708489b7e32c63d78b187493abe0e426d6dfa0bc7136d4c3f76f8d5549ebf173fae8c75987d9d46552dbe137863894fc3ce1d365f0b27f0baa8a3f19d2ff6023efa4b12e180acdfe16ce92e98dcbb2044116f30eb0c30516729c69998844efe2475990661ba7698bf34d21d78f53276370e775c261c2607912fa1627f74a06ed3f81166772ce3033f5a640000000f2b053aa2973a4d0b221d427051b50173f7c71f6008b285cecfc1ca7bf2c5faba6855bc3e20fdb59ee4dba5ef8dee4251a70ecb80fc827b75b9f906e456d2e6a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{039911E1-6B12-11ED-B2F2-7E6ADD856DC1} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1416 iexplore.exe 1416 iexplore.exe 1240 IEXPLORE.EXE 1240 IEXPLORE.EXE 1240 IEXPLORE.EXE 1240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1416 wrote to memory of 1240 1416 iexplore.exe IEXPLORE.EXE PID 1416 wrote to memory of 1240 1416 iexplore.exe IEXPLORE.EXE PID 1416 wrote to memory of 1240 1416 iexplore.exe IEXPLORE.EXE PID 1416 wrote to memory of 1240 1416 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5d3f5f27676da07ee13aea09ce5c8daddf3a45cb5ae72d12000fa68bf611a20d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1416 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD522d80a5a7917df03af9cc4a19cb9ee93
SHA1ee6e80ce5704eef7ba0afb840f5760537ddbd266
SHA25602cb9e20a86cbc9d7159766257d052559106ed0eb23b2aadaa60840c5d9d6b6b
SHA5122d8f84c82d75aefbb2f2f415c413b94b2b4b726c9e0de03aeec79d227bda7e97deb2b5eeb5fdaa31f413ed0d7e0d2a2390a7b3530268e65d2232cedb09c0f9df