Analysis
-
max time kernel
114s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:27
Static task
static1
Behavioral task
behavioral1
Sample
4d833185b7f7ad4ee7f6c9489f8a2f0f6ef2b3ef7f380f9b32f4dc4ddd9a9dba.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4d833185b7f7ad4ee7f6c9489f8a2f0f6ef2b3ef7f380f9b32f4dc4ddd9a9dba.html
Resource
win10v2004-20220812-en
General
-
Target
4d833185b7f7ad4ee7f6c9489f8a2f0f6ef2b3ef7f380f9b32f4dc4ddd9a9dba.html
-
Size
7KB
-
MD5
6c3df2e6480fd463e3a2277006f872dd
-
SHA1
d6a9a6720e15e07832578a01ee20198bc90c0772
-
SHA256
4d833185b7f7ad4ee7f6c9489f8a2f0f6ef2b3ef7f380f9b32f4dc4ddd9a9dba
-
SHA512
e2a82c6c8b7f7bd35d75fa74d206219c2fc9c2eee4825346e10c2257a18f2d86762bb39cea44c260d466700d72461930c5f2e9efec6f5c453610a5490aff18d2
-
SSDEEP
192:rJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLx:dSGabMPvLddLXuSwSTLdlLXugfo2Kax
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C0AAB21-6B1A-11ED-BB94-5A21EB137514} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375964765" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02c8e7127ffd801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001df805aeb9a9f54eab9eae77a9a3f3e4000000000200000000001066000000010000200000000fb3cd247db93eb330e1614919c491fefa4340d9aec73e6d51f65dfac66fdcf8000000000e800000000200002000000082a548286e55204ec42b1f6d844126dde73bcc854ddf92943f8f018a85810a2420000000be04b40302534ea66a746bc5ae9c7b5197a1002fb5cf26db62d087130a75eb7a4000000099473d3601a14899b9e80d6f851255215e4bb056396e13162b3413512ede6f5a18d09dbfe1c0376d0fab6a8616cd9c7519395d8ee71076685e4d448a2fc93715 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1552 iexplore.exe 1552 iexplore.exe 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1552 wrote to memory of 2040 1552 iexplore.exe IEXPLORE.EXE PID 1552 wrote to memory of 2040 1552 iexplore.exe IEXPLORE.EXE PID 1552 wrote to memory of 2040 1552 iexplore.exe IEXPLORE.EXE PID 1552 wrote to memory of 2040 1552 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d833185b7f7ad4ee7f6c9489f8a2f0f6ef2b3ef7f380f9b32f4dc4ddd9a9dba.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1552 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD58c723c71bcd42b020d173a340a66df97
SHA153a49c25bd78dda84e23399ceb208feced7db033
SHA2563fca094ea6f3dd8cfb444d7cb92690e47b7432b5f1d342926219f10ecf0964c6
SHA512673766d8ea5288fa78b1b242cb56837508a58ac13e7c9eeec36f7b930a556361341210c52177d22efb43a9161d95191dcff02e49ef9f218b32ff4191ab561405