Analysis
-
max time kernel
32s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/03/2023, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
ATT0546734934.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ATT0546734934.html
Resource
win10v2004-20230220-en
General
-
Target
ATT0546734934.html
-
Size
72KB
-
MD5
b24f9a7dc6aea0754495905b9be2135b
-
SHA1
03f4f38aef174dc4de2beb535f33c3766d28bb2a
-
SHA256
c7ecb378f1cbce0783e73081ab30ed36cf9260f1d6cffa4aa8b4a782a9775f6f
-
SHA512
63409056c2723dc138c408511cfb4e33f7dde981f7710351fe9e62080859e1a7dd95abcee4c75b75bf595b0972072138520669ca30ce65f47edfce180acec7fd
-
SSDEEP
768:l3sDqo0bsHgwW6OvuZWrFwEtzsRpwltoctSFFhAEzCl0UK8dAHJwtlf39/AHhivz:liOv26t4rwltoctSFFeEzCbOsp97vz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7DCDB8A1-C826-11ED-9F32-72D88D434236} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c8a3886e844ee04ca528537b5bc45899000000000200000000001066000000010000200000004e87f086a498101da1923d6d4800cd0cc983e2b770bba5e9dc2510b94a13c4a0000000000e8000000002000020000000ecdf3e08182f7200582c3d7bc37671f7c15a2a91f44c990d0dbd72430e8d8a0d20000000f9eb7deadc0c8437401d9e4de08c573f5d3c3d7fe7a3fb844ae4a201e2b5f965400000006c791903a3bc5bde47ebe06e82b074576dfe97f0c7bc067e99fd3d1ddf28ce8ff670fab38a731f439a66ba026e2989188960ffd6af6bc0cbd6a8f0373125895e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001a7353335cd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 672 IEXPLORE.EXE 672 IEXPLORE.EXE 672 IEXPLORE.EXE 672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 672 1712 iexplore.exe 29 PID 1712 wrote to memory of 672 1712 iexplore.exe 29 PID 1712 wrote to memory of 672 1712 iexplore.exe 29 PID 1712 wrote to memory of 672 1712 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ATT0546734934.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:672
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c6518908f56eeafa0c97a6af32ec791
SHA16436e49ca702a184088c9f13601f1532f22758a0
SHA25612adbc0ebc1b06ac4ae6ab6882f43638b3d0299963ab8dbe99584978bed49acf
SHA51282b9a5935837cc07835955c2b0cf19cc6e5f810f606e58dd0ec60798c9b4249575d313db610ed4c8d73d3e0ea4bd2397672059cabf3e30281802a242ff515e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a54ad84eb2c7c28f2d19b67d7d974b80
SHA19dff56921516dbb9c1286e6f8672cbc42abceab1
SHA2566a1c75ac2706ad25094b744d0fd6f33e0437677efec74c605217a813a7a377ac
SHA512c44d31bc65e739151b095702d509132926077b16873da43623f9252965fa126b8c5c57b5a22ca1d1e9a31db016c26106b77f77e8183d2cfca2383dd889fe722b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5147b20d0736f89acca053f6c1b6b7fa9
SHA13c7afbdbc448e93c0613816bd6c977e5236a8a0a
SHA256c36c9f3aac2222a226985f9a94848ee83368079b3c39e42a48d0587fde8d27d9
SHA5129bddf77cd8d26a5640872d32a7057fa787c2a6cae296a2f4ec689be8163f86f4673cee8fe8b485149fba6ac0c2605163fad7d9f163951a16c9fb11097b813b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d602fe2a22bb453b29fcfce55a3345c
SHA163af62a5ba9637e97c87080f664581a4c0c752e1
SHA256e224ae486b821204633f72848a9e98eee4882e12efe2e7a05f5bdcf8dd592046
SHA5127759efe1275262453e8bad5e21f439d44a03e9fe219c9f936b07ec97281d508598020e8da4e6a175c3e09512e0fd891fef60f23f39cf1b6f9004a815dbbad9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5939442f35b7d9456088ce8d2312c99d6
SHA1d3e3af9757cb6b208d38c1e38569f0bdfdc0c950
SHA2565b9de1159458eb5c5fce0c48df4c299aacc126aeee7fceee560d14b15b97b702
SHA512b7122e6ad8e391cf56d7248b9868611fefb7926bf90e8aa73da3cf81ff4310a916b632d4459c846fac7d4bdd5562bdbf42b3fc130ced49ab2104272fce232682
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff