Analysis
-
max time kernel
75s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
c02b1bcac35bc0818bfaed59bd1c4691c4cc9aac43fa97172e63b08b4cb7ab29.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c02b1bcac35bc0818bfaed59bd1c4691c4cc9aac43fa97172e63b08b4cb7ab29.html
Resource
win10v2004-20220812-en
General
-
Target
c02b1bcac35bc0818bfaed59bd1c4691c4cc9aac43fa97172e63b08b4cb7ab29.html
-
Size
10KB
-
MD5
499f018daffc5d6a3e415d1eddfd0ac1
-
SHA1
8e98c896a4b41ca5858d91a33b43a0214c290cec
-
SHA256
c02b1bcac35bc0818bfaed59bd1c4691c4cc9aac43fa97172e63b08b4cb7ab29
-
SHA512
7cc54df826e7c7fdbdb96881a74e351e918deaac96feb883af7b1c95fccd5cb7f4921bfff7f2f6bb269d81d3aa5b5da957dc669ab106a4816bed20d7f756c5e1
-
SSDEEP
192:hh9999999999999999999999999999999999999999999999999999999999999t:hh99999999999999999999999999999t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d0f7eb5f09d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001fc76e6a7481c54fa4201d1354956e3e00000000020000000000106600000001000020000000bb99014f3b2bcbe4069c1146c903544c662569162976b123c72109d587322fcb000000000e8000000002000020000000b28a30c4f6d070ea351732754b111f96bd0ed14f59355423ed5887abbf56949620000000f8dce8212e583818caf182c509784e624eae92f2ff4fcc6415e3034ab057d867400000007b66f83fc3d0e410a118404a191e38fb7d2bc0b028e0f6b68048f37fd992547548e384c5afae3144a9d25e9c28f05c5383ddf5c5e01ce53f7a4a9dfa0acace10 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15CEE791-7553-11ED-808D-42A98B637845} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377088507" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1932 iexplore.exe 1932 iexplore.exe 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1064 1932 iexplore.exe 29 PID 1932 wrote to memory of 1064 1932 iexplore.exe 29 PID 1932 wrote to memory of 1064 1932 iexplore.exe 29 PID 1932 wrote to memory of 1064 1932 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c02b1bcac35bc0818bfaed59bd1c4691c4cc9aac43fa97172e63b08b4cb7ab29.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1064
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597B
MD526eb49c25baa47c46efd2c05885b5255
SHA1ee25a424630ec7d8f4d18d027ea82c23b55f78d7
SHA25600bdb6297496e489665e87ff3d740ea970b9ca3679406decda04ad857d7701eb
SHA512b2f75f7e8357e987a17f0d228ba0204045bb5e18ce3ab631cfb9b56804f6450acfbd55d559ce54de19ba26672edf628452f7dfd53501540c1c9d05b3cf4538cc