Analysis
-
max time kernel
117s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
Electronic Invoice_64549934192-2023_JPG.htm
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Electronic Invoice_64549934192-2023_JPG.htm
Resource
win10v2004-20230915-en
General
-
Target
Electronic Invoice_64549934192-2023_JPG.htm
-
Size
5KB
-
MD5
6481488567ea7cfb4a7a7be9103618c0
-
SHA1
f28e9086e9397c450be00ee077af4dbd0d527ae4
-
SHA256
ac00ad19ccc7cf8caf357ea67b7993742571a437358aa54c8156d16cfb78fe6c
-
SHA512
b0ae6a00abd7f4748ce9b58557e83492a44bbf7b49e0dd3ba9f19f5af2d0eea85c0204fa77e79a8e61b90211ba5892fdf673947cf6b9487452114c8cd7759aae
-
SSDEEP
96:h1TdXb+xiTb5NLTbpvNsvvR3B5v+mbBRP5KJL6w3kq99q++t6BVARWMDqx2qtQ2i:TRL+xiBNLxCxXtr5KJL3kqPqztaVARWI
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002bccc567d90a0b479b49b1b2d43318c30000000002000000000010660000000100002000000041df7a4e8a7e890858f746a3d082592a9fed59f247d086bee7f1d14a8bccd104000000000e8000000002000020000000f7ee1741bc319accfb44a0032bba0644e27fb3be5161bdfaa256f8f08267d71020000000a1a80b574e376a3dfae1479d5ea522124ec6e382f2934d245d5166398f63b47a400000002896ac4545d5ceb4050a5b8330844062c3071eb09af39fa2f8c7d394a6f5af91841558efc40c4494b0413ca48051777030c44e7b728a744f434f4940d2f0da79 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "403368345" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0523851-69D2-11EE-AE34-661AB9D85156} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e02f60b3dffdd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2172 1712 iexplore.exe 28 PID 1712 wrote to memory of 2172 1712 iexplore.exe 28 PID 1712 wrote to memory of 2172 1712 iexplore.exe 28 PID 1712 wrote to memory of 2172 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Electronic Invoice_64549934192-2023_JPG.htm"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54abe28e5ac23891e8cf09515838c6f85
SHA14c7a1fe8b2d1114496319749b7eb19c06c0d8d85
SHA25649d4c1e3c3e0005a6b796d6426a53c7339e524df94a9c7da7fb771c9210f45de
SHA512fc06d557a175fcb7bc84e0d2828d556e6a5d81e28adbee392e49b4265b0d4416a652afdf18cfed71b23c8a5ee1d2873b9edfcd1881e51fe5f783ccb142920d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514ce1e2bcc9120bcd0c37d8bd45c2e09
SHA1cef8266a2af9718250226326127d9b1001c81c51
SHA25631075b7e4166640db2e424ace5ccb683bedc4460acd772ac622f3e10f722ece9
SHA5122e4d0a1f058aff278f354b4b93734242ce1750ad79682341134f589faf8a7eda27870777511eae189365f34d2b5629adb3a1853a5d50e54cb5171372da41afc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511a70658dc622ceaaefcc21cd0828d37
SHA187084a434ba5e8d429edf981c75114f049bb28f8
SHA25604d726ffd02a93e6461f5e2c6ad9960e117583eec70a1256985f195c9d29e300
SHA51202034515fed1cce1a326cd6f2d554291c2815de5964f44660b469a19572498dd2b0b4b700f4134ecb0dbb23096f18afbb124083e15fa9834bcc36dac0dc0e0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5594e1877365aa2939566feeb65d29639
SHA100ff19c8425b4d9a17d1f1ce91dfa416fd70534c
SHA2563a1709d5ee5d2c153d634383644185d7c737733f397352c764751137bf49250f
SHA5129e69949f22e7bb57bac3b577a1bb7a2165c30228eb3dbf74ba915de5a3cf845d646121c9febb4bef75ca61cd83c1fd208db9c779fae8d23e0992a93b3ed8e027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD516eacefa48de8a5678dcd702181ae752
SHA11e95769012ecb9d42f68860a0884e616e5b566fe
SHA2561ddc79c68b27e904de0ec19895b252e25a1b8663a73c03ef8193f1cbb88086e2
SHA512a897fb1584e047308058ae448acd4673873321c92ee12b0ac0af10b6f5c1b924141dc778a99408bad98e5455086f69afc6a88899a78c66a6c3cef436ca462fc5
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf