Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 04:15
Static task
static1
Behavioral task
behavioral1
Sample
5f58612056ae5baa0d494a87eae5467462c792b7b636ecda48657408ca5f4a26.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f58612056ae5baa0d494a87eae5467462c792b7b636ecda48657408ca5f4a26.html
Resource
win10v2004-20220812-en
General
-
Target
5f58612056ae5baa0d494a87eae5467462c792b7b636ecda48657408ca5f4a26.html
-
Size
7KB
-
MD5
e2b7fc2a255ad4e2aca42012c52fab80
-
SHA1
0ef1d60f8767f3caf8f5c973e5c7d1951a0149d3
-
SHA256
5f58612056ae5baa0d494a87eae5467462c792b7b636ecda48657408ca5f4a26
-
SHA512
dfd90004c83803412dc2aab27195611becb8b82d4a052deee54dbcb3a7f7457cbe9deef0a101d467aa9fd618716ef3bbe7963feaa46149eff4c5a43ee65e3583
-
SSDEEP
192:vJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLF:xSGabMPvLddLXuSwSTLdlLXugfo2KaF
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ed39cc2d9fdf584c86e5f5b348781de90000000002000000000010660000000100002000000083439ac82889f34cf06f2f6a2f01814d566b5669c8b2a5b78eb45e135a565988000000000e8000000002000020000000c2dd68067e43c5de9517d3b7ff1a840349fb0ccce13df289ecc386f7eca733cc20000000b01570af7ec794cda54ec42a1ce6487472afcec0f39ad69f711a1d9c2aafefa9400000005aaf480d5171f0cf37567e778b48f263dc394a12783433e44e152f1a884b81266e1f2e137bb1e35029bad7b9a6f0f5c27375f0bc6e9df6b13e14a24c5e5c59ad iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376046039" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04ee2c1e4ffd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBEC3561-6BD7-11ED-8413-C22E595EE768} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1652 iexplore.exe 1652 iexplore.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1652 wrote to memory of 1512 1652 iexplore.exe IEXPLORE.EXE PID 1652 wrote to memory of 1512 1652 iexplore.exe IEXPLORE.EXE PID 1652 wrote to memory of 1512 1652 iexplore.exe IEXPLORE.EXE PID 1652 wrote to memory of 1512 1652 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f58612056ae5baa0d494a87eae5467462c792b7b636ecda48657408ca5f4a26.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD5e5ed9f80aadd2bdd856b419294167103
SHA10ab66e47ae5b4f993b27dfb11514e1e18683f392
SHA256b8655e98afd632c6761b7a0fb67287083290b60f6ff0ccfc0954b8c4b7eecc9d
SHA512c1f0fb01f175c9c99adc14c8619484ed0235f41782d560fa59ab3dfe537a5a8216238fbdf7407fa97e3824ff37d383484e98ef54c250952bcc7fefa42b249461