Analysis
-
max time kernel
100s -
max time network
182s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:32
Static task
static1
Behavioral task
behavioral1
Sample
1ca6aead86108587443bc73934c0ceff4ed8a01d1831fd22421550971782bf76.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ca6aead86108587443bc73934c0ceff4ed8a01d1831fd22421550971782bf76.html
Resource
win10v2004-20220812-en
General
-
Target
1ca6aead86108587443bc73934c0ceff4ed8a01d1831fd22421550971782bf76.html
-
Size
7KB
-
MD5
c78b675ed6953e3db1351d2d96ab9feb
-
SHA1
21bae5dfd343f4f6ba4a2b9db28e96c05db748cd
-
SHA256
1ca6aead86108587443bc73934c0ceff4ed8a01d1831fd22421550971782bf76
-
SHA512
e7910281ecd66fba6ce6f8f4ca67e31a0feea97613cc0820dee83fc49ce5098ee91e3260b7c2ef4806fd56abf3551c48df448beb2f4c08fbb913881eb329d56f
-
SSDEEP
192:92JSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLk:9QSGabMPvLddLXuSwSTLdlLXugfo2Kak
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375965353" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000473c15456c74a14eb56049c778c0810f00000000020000000000106600000001000020000000a605b70caef53aa40f0166eafb9acffa534d2dbccabb6f57712078b0880c99e4000000000e80000000020000200000003e40e93adc0ba5cbb089ff0609f622c906cf887ebc27131f9aa00e02a95ff77620000000e167236a8e85701888d1d0f2cea358d9870d5f5925f97f454b399f6c39bb47f9400000007f3b11ef9e9d739836e750c1a3610c2bd9d1654f8e2a562e30da6df16be8dc6cc6dfc09eb309b8eb6244d6a0f95ba8621ffa66febca9c0c41a261fa3b7c2adb6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{07D5C5A1-6B1C-11ED-A674-466E2F293893} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90aa70de28ffd801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000473c15456c74a14eb56049c778c0810f000000000200000000001066000000010000200000001024e0206e1d613dc4c866b7bd0b570f93c04a6281cea2927fdd8b373196ab98000000000e80000000020000200000002aa7000759fe24eba9ee019e4b8ef9f84b3ab09d1e4afdaddf23efafc065b66d90000000c32e8bef0ff787d8f88a92f157c79a063c84fc0b6270597b376f1f1d453cee6ae1a7a84a9b85d5bf2240066ef788bd9ce7b1b4815c9952295282ccc2f1ed21ed325f3091b9d2f3cc4fe749085aa2963ac1a1c2647c763c4447ce93bcc3be1d65dec835fc117a8619c67d1b83e90192eeb375962a1d5307e13b38b58845b35f2d37af712bd464cf9f22c312e393f5c3cd40000000b86c246658acdd72c2262f4e0aeeee9145ddccd072f2e0054f9b7857ff897431951b6b8afa43b42c239d9f32aaa92a80403c87929bb6397afc985f2ebbb0ba48 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1964 iexplore.exe 1964 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1964 wrote to memory of 1612 1964 iexplore.exe IEXPLORE.EXE PID 1964 wrote to memory of 1612 1964 iexplore.exe IEXPLORE.EXE PID 1964 wrote to memory of 1612 1964 iexplore.exe IEXPLORE.EXE PID 1964 wrote to memory of 1612 1964 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1ca6aead86108587443bc73934c0ceff4ed8a01d1831fd22421550971782bf76.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD5225edfd4a16a7fb43db3b66ff4c37f90
SHA1dc015b09edf2a4415ffe18a08a16c5ddb3bf7c8c
SHA25610c8ceabffaa4d4a8ee7782519503b2605dbf9c76aacb42624bafae306da5b83
SHA5123f6c781e4653164797e1a8a20fce3c0cb6453a71fae9f8327c4b88c5c5f3f2668143bfdd2098db33ee479dfd7eefc4dd82e3953b44d94df3c3915efa16d5c4ee