Resubmissions
15/05/2023, 13:53
230515-q6ykraea91 715/05/2023, 13:52
230515-q6g8rsff87 115/05/2023, 13:49
230515-q42vdsea81 6Analysis
-
max time kernel
18s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15/05/2023, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20230220-en
General
-
Target
sample.html
-
Size
16KB
-
MD5
8a63e04df2cd6bd9792a9524586b3e4e
-
SHA1
784ada903b3adde8816dd77d0740f6457ac0f7b8
-
SHA256
07f978162b8ce41b67036584aab26e303d72dfc9c9491985e1fa67faa6475920
-
SHA512
9b5a7f0ff5764ecb8952fb579f92aceca54cf610a9348e5622aa95cdcf2ba5b8623b07fcbf884c9db46068f17a0316531142b1254de6b17841c4dc37c44d1ba9
-
SSDEEP
384:rEFL7aCDpmRgVoOsKuElKeGMzU8HhhbMRx7328B2WBJCBXQL:rYXaCfVoOsKRI1MLBhbQBHDJQQL
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7EFC8571-F338-11ED-848B-F2A4F945A9C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 652 IEXPLORE.EXE 652 IEXPLORE.EXE 652 IEXPLORE.EXE 652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 652 1716 iexplore.exe 29 PID 1716 wrote to memory of 652 1716 iexplore.exe 29 PID 1716 wrote to memory of 652 1716 iexplore.exe 29 PID 1716 wrote to memory of 652 1716 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:652
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5de4da022f4e1c82f419f42f71617b3c0
SHA1a6e52a2eed1ac28e83fd7dba5d7044dc58a63af5
SHA2567d0928abcba3db68d362898bcae99d4f443676be9f478143c80504c90f1daa76
SHA51239b9b44b70ad8a22bcfdb437532d1ff398bd9fb4d5b40250473e932fa0fee08fd1a4e9b8b077d5e44cf6c0ca640269b634f5a14acf5696a3f411881fb25b8cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5803b31389e74c316aae00d39ae9131f0
SHA1db08737e262b3b396b636b1df959fc545fd0131d
SHA256f4dc6fca0dae303669ac12acecf8edd21999ee4e78efc904dd2af41d9474e0c2
SHA51223d287fe80e202b6e75c001fdd93f3519b65f3803916a7915f4f79f272e4f55a8cc4da0b4284ac1afd9ac2f24b074e3676a85e36e082bf665a1130ec5822cd6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD512123e1409a08d251f266d445fc81be0
SHA1915dc4cc1a302cd71de152fccd3b5930806ef8e9
SHA256783de5a377293779595385f4807273b951b727889d0980c37f54b6e8e79d48f8
SHA512999ef2756a2fc8eb1da38c6ae9f2952694c45cdd933cbfad5def5b0e32cd29468e21c5e13030107bf9da9161a869533f8b99a8436f7bad58722cfeb348d41cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5222c49a829054296b56e48bc5459478a
SHA1bdbc7a940966d734a4ad660b395993cb0d78ea79
SHA2563c663a6d31e9867075be97cb70940a4ecfcdee1ad4f320b9d6911853d3908b33
SHA512caf09aad22fc5d898f561341caf43db8c5564e35cc7aca59f7c63572bdfd3b9dcbfb0ceadc2aa6a84ac8dab8b1a713e4d957ac62311e9b752d4281deea414897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce4369f079b635d6f683eabcc90eda3e
SHA1d3893ddcbfb3fa90d5e6fc0f226ec822d17dec49
SHA256408f2b170077c13b31df9477eb6fe7260645e9214943c0f58bbac0bd420b4700
SHA512180f5cf14787297d11f1f3168ae6da7fff830df1ba26a6c9c82db671c74e39f873632cd7288c14702ab3f93ecafb26bd8adcf7ff82c216f4226bfdc3871c7165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e1bcd1569a92b30bce662a25e240af0
SHA16e6ab3e926e21cc7d9145374f212904e8bc32ad3
SHA256bba7591390dbfa2cbdc0d7a10a178c05c59f450daa006893103425f4fa261cc6
SHA5129770af1247ae2427a51e23e31fc491e7be10ba4b5f75fa061e0dca23fc731f24ec5a393e8751df3ec1a45ebb9a2cafa720690bcda260cdd60ab05f6c6c107272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f39d4f4c41b13b98908f0c032ec5b14
SHA178ded60457d689e33c2bbefa6d0d66dc8031cfc4
SHA256d683bece671fe78fdbc50516e44f337504d1cda188f55371ecf8d05b9768dbbd
SHA512ebf09e0693ff4d045494818daace63675c4c2696a4879321e1e78770e2afa20f45e16425a351a4ddeddd5f390e5c89e0da0df9b9c6b1a2c807fb9fa44590a23b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e9ddfaccc6aab6569cc2743dcd2a9e3
SHA144b76a1fd5e68fc314f9c73cab96b0d8a2947903
SHA256e3bcf353eeeeb3367563779638ee11975ba1a30e4d75f93d04c4cfeda42da0b8
SHA512517f90d6aa02c5ce1b77e8782d91cded60c01dd65158701235405be9e0245c506e95f91bc8aee202c1dd53c4be6bcb5ae4c7d1fce3b0fb0ad297071ce8ae50d0
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27