Analysis
-
max time kernel
113s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:25
Static task
static1
Behavioral task
behavioral1
Sample
5b172044a93cf1e1dac75969359d1a9de7636045e1bbc9de64a668f5ae7a10e7.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5b172044a93cf1e1dac75969359d1a9de7636045e1bbc9de64a668f5ae7a10e7.html
Resource
win10v2004-20221111-en
General
-
Target
5b172044a93cf1e1dac75969359d1a9de7636045e1bbc9de64a668f5ae7a10e7.html
-
Size
7KB
-
MD5
5032ec148dbbcb0e2b1d76ae24287a63
-
SHA1
93f0b3ad0830fb8dbff2318f3ddeba8cae4bacc0
-
SHA256
5b172044a93cf1e1dac75969359d1a9de7636045e1bbc9de64a668f5ae7a10e7
-
SHA512
75d57d29a47a5b07ba1a9a4beeebe4db8e87b0671e38962f54bf08aedb675e9686a2268a265f9d4aec0fff659a762d0cb2350df2dc52cb0d95dcf2007c102fa6
-
SSDEEP
192:/JSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLlPCm:hSGabMPvLddLXuSwSTLdlLXugfo2KalP
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375964670" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809c525327ffd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71134761-6B1A-11ED-B98A-FAB5137186BE} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000005caf9e4dc61e64e88607724619349690000000002000000000010660000000100002000000033372108e2ab555d1a0d801af9464f3e54f2c232f7671be90467559d17dd226b000000000e8000000002000020000000702f958b7a340ffd84f7e8cb9fcf6732ef774fce8e81ccee871e92f4bfaef4e42000000020394dd495c7b894d876c3becfedf78409b911488a2004c85ea6c9ec93d088fa400000008b4b4623afa1f6f947dfda494664b0a58a29b0048a9f7582152af981563b2deaf0c450e1fd75136cb6752265da6a0c980eac8bdee00403e299564a36494cb2de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1452 iexplore.exe 1452 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1452 wrote to memory of 1648 1452 iexplore.exe IEXPLORE.EXE PID 1452 wrote to memory of 1648 1452 iexplore.exe IEXPLORE.EXE PID 1452 wrote to memory of 1648 1452 iexplore.exe IEXPLORE.EXE PID 1452 wrote to memory of 1648 1452 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b172044a93cf1e1dac75969359d1a9de7636045e1bbc9de64a668f5ae7a10e7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
606B
MD53a5901a512fefb6fde202ca8c2150a8d
SHA104796263815a82ec0ae5a60bd18199122f7e6c70
SHA256812df417ce5121b684763c0ec8ae64008d6ddd31f636bf9f256f7c2b9320260b
SHA512fdf9bd5ae0a8fb0f2ff2f0b69940f4866356113fdd96cf4d5a251df13c93817c6d529cae5901a8ceb16d35a0bd18f3fbb9264547beaf07b56468eb12ecd8c2c8