Resubmissions
13/07/2023, 10:32
230713-mk71hshc5s 1Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
13/07/2023, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
action.html
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
action.html
Resource
win10v2004-20230703-en
General
-
Target
action.html
-
Size
442B
-
MD5
d8c1af8e77e38c26c9331ff8d05ba9ee
-
SHA1
9cc7818f5390c1b9f1c784a4e46f3058752d2f4a
-
SHA256
c529139a9b0965d96ef4bf37245098d53cb7b48f1e27cb99612d1e181b4f8c23
-
SHA512
78739c05595bf2f35175d07e2107906a3bb4343d7f0c42d88a84109654c8b611d368193013adad257c2d1dab073ed527649a011d3331dbd285d9d6312751ef93
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b02100000000020000000000106600000001000020000000bdc7489c7bbf2b786dfc52adc4aa11434e3a2e91fab4122beb34e1788a33e941000000000e80000000020000200000004a50adb1a7576ec157dab7bf97b63c02f6467b0b300878c4008086f90e46361820000000cfaa2d5f32299b1be8ab693c3c991e04ac79541f5e7a9ac8a418d534a83220d840000000e65e8c8b3b99193d8e29a3e39d67165cf4ee9b9df37138030023435de3d03be76373b62d7eca6203976c84f60a0b4b1f529e1ce340b967698b6145fc99d46367 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396009333" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{969078F1-2168-11EE-A944-EE35FE5859DE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e2486b75b5d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2504 3016 iexplore.exe 28 PID 3016 wrote to memory of 2504 3016 iexplore.exe 28 PID 3016 wrote to memory of 2504 3016 iexplore.exe 28 PID 3016 wrote to memory of 2504 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\action.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f25bbaf51e68a7644fd477c5b3b7eaa3
SHA1d7560767262140f4c86ba591803a133e66d65400
SHA2562faf2338d48411c0289d207e992115391ec1e5ec8b8fad8b186ec480eb06ec8a
SHA512ff948cb0a73524b142e150527d665fb664698346f9e66a7d189d3d6f337bdf79c490fd2f852bff4611ebd2dca83367866d13eb608643325cb83152dde80cd3bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca44c7fc57077625d956c3c0df3091d5
SHA1a11f456dbc8d79f732f36850844d294086507e4b
SHA256522bc97dbb60c0ba13d34de589bfc0c17f635ffd6a13d0cc2f43a578d77371e3
SHA5125f9294cfe76b44c90ea31e6921dc046a903b64cc1c576b4e1e4eea3278bca98561e59ac94f52466f1bc902ad288b3db4193e8c9ff8350749630da082d5405ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5febe96e3ed6bb3d26fb980f86d14afff
SHA1c209205b94131d639c07434fe4b5b9f1e265e962
SHA256a3ccc27ae1ab4e58922675e6965186f68c6a5c3a296dad1523c8397197cba056
SHA51247637402be65379d89ea496173a904d851e6bf4e84dd07027c51f8759feabdab8edb9c7d717ef52032a9892d9f13c223fb706c69085d0a32c1d1a9264415867a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f54dc46c346ee7464c1e34cffde0df4
SHA154d65eca999996c715327248d17d6ca0451f31f1
SHA2562d0d19a03c7d89e7aa9708bd02c33e43abd6c8509c0136dedcc4938e1e630fa5
SHA512df3e9c5fd450c8bcb3a9d57c7af8a7c581a7204f22433e7b9d270f143cd339e6f33f09dad0b04e9bd488ebf1d7394460e956a34fd127a1c71f017e7a59d63db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56edb7f2a20542036f4b3ce9c33a1cf27
SHA196b01ff0d711d1c24d949b0b7c468e6a91de048f
SHA2563c9273e4b9a1117fa76f800095bd0710f0774d44e061a6fc13bd98c8c3d38c0b
SHA5123fa0d16e5d92933248c10c9d1187e29f038313ee46208fb888fd9a5b05d8dd3fa192350d760ca0c24ea1a543ecfed9c152751c3a0f46b08adb6cce69c0cdfcbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0a759ba36c3a11270f768cd51a457af
SHA143128600cf11c121ba6e9705224f499af9162dbb
SHA2565ebc383df19dddfb18057e4cf7c53089f05455a0dc00b18320ad1f049094f244
SHA51244084070617fefdfd30f8ee4cebbd84fbb4245fa82555ccc9c316db3f722681f0b749e9b1f1647c16d8fc7063577cd9f715cb90a1eda1923f0ea1475ae58cd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50002471f58928e817551df13ad37d26e
SHA1db39102d9edb411f37e0acfc545dea8677331597
SHA25684123764666c2ce8c24026547b6c22b985d6167fb9c2fe1d81e325692c379557
SHA5126cf506abbc0e6627cb5d8d3af2ca5b58a0086a62616cd8f172b3384e281ebcf5ad653c13a95e7dea4577012b1b38f308fcbb13d2fd8ccd1a0a986461da74bc37
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U6AGJ71Z\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
603B
MD5d84b2b202dcc14222712598437ae07f1
SHA1b3409d357fb83f4c0978dd3b8517cac98c5f95f2
SHA256e8c0a1f66a04258146160efb3e9ab57d24c5f538c9cbf7c8813496ea1a9828ec
SHA512a30fe8707732c8a441bc43d8ca91674cf1f3728eff6065eda375dd273d07058754b9eef9d94a1484fa5aa33414127a41058c4b42ad6c45576f1f7cdf92bf69c3