Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
1037f7341d6d2fbf154462f2d3377247.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1037f7341d6d2fbf154462f2d3377247.html
Resource
win10v2004-20231215-en
General
-
Target
1037f7341d6d2fbf154462f2d3377247.html
-
Size
66KB
-
MD5
1037f7341d6d2fbf154462f2d3377247
-
SHA1
2c1f6cd72846654b618db596e1d8795d71a9cd36
-
SHA256
796d429ea7e5b73b0b93f098cdb0d19c771574b7f1c60a9ce74880f6bf85b0a1
-
SHA512
008f3e682a06055fd787de929b154006e76c64941a1d2f30f98e29727aec2b364c01c6fda3ef8c5953084c2f846dc614b8dfd3e1b8076a6c2316d2092c5f06b6
-
SSDEEP
1536:vcIRIOITIwIgIlKZgNDfIwIGI5I8J7SYIRIOITIwIgIHKZgNDfIwIGI5IvJ7S/1x:v+1z5+IziIqG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{095755B1-9E79-11EE-B160-56B3956C75C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90368ade8532da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c193000000000020000000000106600000001000020000000f2295172756a3b23395ce21b270edeb9cd829e5002b094734571af10f667f43b000000000e8000000002000020000000b5e4e69872f16a9aa4ee51d1ee3a7aa05d47c7a3932dcac6cde5a6c09aa9aae42000000039a45ef5397e9c17dc94079dcbe30e14286e6d9ff9197c8bf1b8e636ec962f0040000000a266d6c8d81c17b3401112613096fd6efe4986834f598bfd7d7ab56e72a4daea588188224ed6767f71fc4b1bf26f53619bb0e7a80e2443b794685a41733dc5fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409157185" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1560 iexplore.exe 1560 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2884 1560 iexplore.exe 28 PID 1560 wrote to memory of 2884 1560 iexplore.exe 28 PID 1560 wrote to memory of 2884 1560 iexplore.exe 28 PID 1560 wrote to memory of 2884 1560 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1037f7341d6d2fbf154462f2d3377247.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538772e694369bda29f8a0e47c5a40e93
SHA10dd4e39377e46bf89efffabc2202fafc4c7cbb0e
SHA256558c9491eeff6d80fd13ddd0bad3b2fa3f58292df6ca8a5a7df8f5aa373bae8b
SHA512dfd621684418f8a808595efabb2a5cbbfe0d626f984c0b0c8b1ca5228ec37a1b9955d052c70cd6963d9f2941e032e4448be30c7a72f0398a569476a40dc16d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9d97f02459ad63b2e7b1de199e6dfaf
SHA141597883d332ecafc5e2ed9078debe234f2ca838
SHA25644bbeb94982b70ee8724f3ad3fa7879320e5304cc8501ab756a7fdbab1871cb3
SHA51282deafcf76ee74a5c9f8823c8b6fdd4c4e17a2d2aee727380db269843a981a0760491b6c8648bc84e5a0d2a9694bc68c306dc69358eea815800aa7c24582e25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59190d6c0fe1a753a199979e52a755d82
SHA1b689cf85dd2d588ec183b48b6d6758a5459283bd
SHA256534e9f726da828fdcaaad02404db9449e3a26127f7182f823173442c059d9949
SHA5122682f008efc04c15f964b99c488c4f51fc474da7d8bd4cfe5a2c5972032e28437ef853bdb849f3bf513dd68c87efcd08376fd9597a42ecb4e002775ed0fa1e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fde4e8316116d44cd56b692d8f69ad4f
SHA1a927efcee44f1e6e1f0bb9ade11bb3120ef9e04b
SHA256a2b653e4288f15876da785a0bad9231829b7f1407ee6c1dfedd9b88dcc674b8c
SHA51217290db633699f16fecd95fd7cfbc56484f8a5242cc97b00ee4c2376281763f0ced48fbe64103ee675595698cf0f1c763a8c2690db87d9060bfb75c809bdbf9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d25b24aaa85953f6860def3b08390dd
SHA17af7afd3ad5daca449e41970dfb759d452454aae
SHA256d453a00da1a40e531cb62661f6fea1156987609633b2a694d50ccfa04010020b
SHA51250c910effe849c55fdd1414408898605855e540ac9059e6716e9b6ab2ef1f9a5dae379aab12f66940105e9f097fbd376f3241fbeee485286fb3feb9f29bd957e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50582614d1314f34aef2d8ca5d6d82fba
SHA10efd115356be5c7e4cf5f1c130526a2c72635a73
SHA256c1eccc6eff57d6eced2466534750c0addc28f3e58d3b37bd36f661301217aa5e
SHA512f0c0d2849d19b13ee0a772b39a9970d58c47dcfc1db019f6f963f8fea8984fb184456c249524e5826d10e4a3bc934c91e5fb4fda3bfaa05b40b3c035dcbf9289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591462a2c3688dd1a22b93c2ce00d1e94
SHA1c32093baa2d1a6aeb48006b0d21deb968fa45288
SHA256d45bf3d2a44384923cdda7d893bb9894e89e06d27c87c78efe8aeaa36db5636a
SHA51268926671ef540d0a79706bd53788256220f65b65088c139a2ee32d1e2b338509c1c515f1c232162295cb24b2c6e23703d7ef5aad6f6e7a79e00d45c98fde586f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae4b98c479b0fe7ce4d94cb8f51d59f6
SHA1608042607075c2318a319c7eb4912e4cb76f16ab
SHA2567479bcf4e660bb149fca4cdd84e93d156156040dfa811c397bb4d7d305152d30
SHA51284f00d481db59fc876a5f7bdc1163f46391fc3652b7de5bc4a6620f145ad398b0c0084dd258df27f231e7b818245c58e03f7ae9462fbed0cf751702fed62f0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5756a23983ccfe308e1e8b7099f4c410c
SHA10c727e63c7926952e94c2b34d14037cf8cb4ddbd
SHA25619a3a3ff42df81e4ab8b038289868fef283c66a975bac23fd8432e00891a5cda
SHA512473785b4a750291999577776d13bd1d117702d2af32da6f64f482b8810365252767b93ce1b065e78789841ae032b4d8182a373d37424e6ede4a096ad1abd4eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b07eaf9b0cc36a46735694212d30ff06
SHA1a3483f77ff2f3f26f3e063d27056d97a22ccb1d1
SHA25696489e1f48ee332bbc15fbd9de3ad4fc832c14b39d604439edb2573a1a59aedf
SHA5121930a550f906490322465c7a88470f4f5fb5d0981a8ecf805def9a19a82ac7014c68a54a4ae8d761925fc5aef4555ccef4abc502d00462c84180ba06948d33e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cb85ecc5edc3ef20c3d65ad2d26b1f7
SHA1d68ddf3de7906848551814a39ac9b512ad9beba4
SHA256d63ad870e9654e2396dcdfff2c75643abddfa25a727b316adf53844e627ac6bc
SHA5125ee3e72a6c344a6f584903f8854572536b450164e914cbdb178e63086800be91b45160e5062a5a16b9799a30fe984b3300a528d22d9ba7a39582907b9ce83122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fb6710b4134408c966183a602bcd3cc
SHA115e814253802d3ac45f3edc147b06c519553b9f7
SHA2564879680cbfdd2ad96286327c20fcdb8fc148f32de37299cd8a63f3adceec75ee
SHA5125d09858dddee1d9242bb28727b93ebac433abbf2edb57d2bea7729baf0ca6dea4567459a352bade0c2a020b36d25bdb005e881a936ac59c2f26505f883fcc63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e53152e80877a773db2177a30ad2fd0
SHA17921a9157e07e0595df89792d1de2bd941b20bb5
SHA2566677dee2277349ea6dd2196075f3aa16e75427e9d5718e9458da1a21dc9a1b62
SHA51216b75ae18b8207b6647cda861939579d2e0f609dcaf6d48d5cf1edd221c80b638f0b5d358f8e5172e0043c98bfe5955ab0fe63d35bceef1475f3071a0cf6f9f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594fc982ae91fca76fccfb340109631ca
SHA17012ffaaca31f03be5e640acb77879f004614c52
SHA256e215adb5a8106e8fd3249c8cb7d7e05c5d7a97f1b1b99f34ae3e11b680ca3862
SHA5120422c1ba10154f47003a23b0560e54d61a0b6343208cee462656bab6cb7881e74e6eb03eb31aeabe4c6c4b25b4707697817d272afe34c530a0828eca97d8b2ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513114a4aa48fdf82b400ab75eccdd5ae
SHA195256831c018eaa3ad83c972eb4e3571a8594bc5
SHA2568362826f0213bdf19e15118ef0840349aceac966b462cc7dc218e0e608c2bf4e
SHA512b5a0336ecb364a8679c071b8b6acb1fee2f446841e120edbf85f31db973a55b78181e434aaaacb159641e1fb006c622bbf96979bd8576279afcfb8f9bd672f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bea87adfe65f807f629c621f8e2215a
SHA1794455f478160955d305d7e22c9aca16bb9f8e94
SHA256ff64a3f5971cb3343266056ec514bd6bbde5788221a226f9d1157c94e5905906
SHA51235da4725273f3230553bd5f668376829166bd8827e9976e5e7befe3c33f34810bd06fa163702cf6a08770d96b6a827ba1366ff50c46ab1ae61d736352db7b825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e45a1a2b232b5ba7045094dcda32d83
SHA127bcf816db07eb91b909777a1f5ead5f6a6c9a6d
SHA256e7eac8dc586ec1d006379850851ddfb918b9dd59989f6ed8b87d29ddb866ae89
SHA512b09fcb88527ee53a790ee9d223b3e8cd3002928706ba5e20ef57b707c5d37055c90f55a79bf7b674792696562bc6f97d90cda1bd8c94f168648ab3127dd3d927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a74d3f30536d5e8b4bdf05e92e1d3544
SHA11256ecb68eeda8bacfbcf0384af07b1e30657d80
SHA256714bb17e873b3681f5490cca249b9d5fa8331e21d377e63f1877af7a2ef75d43
SHA5124903a6e9189e769af9bd1a59fa480cc4428c3489d6615325a0cf861c6662a613a5dfeafc9a539d020bb0f0c03ef1f683780dbecc117884cc393717fa30b661a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be28a2ca54dd755cbfaa9a950dfec063
SHA1112fe9de418ba1e044adbec4c9dfc765fe3fb412
SHA25620458278e4439100625dea0d5672920099d123986e10739a1391897e205fae22
SHA5123f583c621a2f0c13e79dbc5253a377617f4411384583d58b204f888e91c8431491629a876021d6044c54287ad848a90e0ae4730fa9a36c00d6f40da226d1eb8b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06