Analysis
-
max time kernel
90s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:29
Static task
static1
Behavioral task
behavioral1
Sample
35fbcf3cec60e51200fb0f833acacb13f2a44d200cf0a3c2ffa43a598e57039b.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35fbcf3cec60e51200fb0f833acacb13f2a44d200cf0a3c2ffa43a598e57039b.html
Resource
win10v2004-20220901-en
General
-
Target
35fbcf3cec60e51200fb0f833acacb13f2a44d200cf0a3c2ffa43a598e57039b.html
-
Size
7KB
-
MD5
48649065a4eb202a0ea62f2da7b75b8a
-
SHA1
4995a3e4ac58a3ece650a20537d4b461344e7f3d
-
SHA256
35fbcf3cec60e51200fb0f833acacb13f2a44d200cf0a3c2ffa43a598e57039b
-
SHA512
56b5c809b413c0753a84de4aa0dd884314c64cc751a7c2a9ebe97ba32f7d8a6f447673f5953ee7a2467f5227150d4e38d67c67f731892c1c8ed765db3fe1e99a
-
SSDEEP
192:1eJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLnUJT:1YSGabMPvLddLXuSwSTLdlLXugfo2KaY
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ac219e01f349bc47b4639342d276a0cf00000000020000000000106600000001000020000000f7f60b16898d6f5cda8f6b6c4bcaa58cb5d9bdab2283000aaab7813b4f24190f000000000e80000000020000200000008326ae71d518704d223babde1439830f779625d4caf3dbff431fe84dd509a516200000009cd868d45dfbb654d71155bbdb4b110d3ff7a53865eaf21af2b6dbcfc666b2c2400000000ede8d9be3962dac0f2edf6e549c10ee8ebe0efc02787e4db9a50768416bd28a0e37a294b94d6393d9106b14a27200d3505485467274cfafa8d5d7b13330a899 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90cbe04328ffd801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375965107" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E766F91-6B1B-11ED-9551-6E705F4A26E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 964 iexplore.exe 964 iexplore.exe 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 964 wrote to memory of 1304 964 iexplore.exe IEXPLORE.EXE PID 964 wrote to memory of 1304 964 iexplore.exe IEXPLORE.EXE PID 964 wrote to memory of 1304 964 iexplore.exe IEXPLORE.EXE PID 964 wrote to memory of 1304 964 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\35fbcf3cec60e51200fb0f833acacb13f2a44d200cf0a3c2ffa43a598e57039b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1304
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD5d6da7f3b709f3b5844e8d500eacf2f75
SHA1a8957af329f0ad985a6d5610de207c24055a9b7a
SHA2567f9d6e478a2878e2800ad4010c88bff978ca4c5646f9e726d3bafe12652e5f91
SHA5126eb5d8044782f668560581ca75edffeba70e5b86a0df11ac82f8b4edb40998fa452affcac13e560fcfc343f86496e31c91da3753fb36d0791781ac0c482f6654