Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
84c35d82db5d35f2f0a7e39181b0d1e2.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
84c35d82db5d35f2f0a7e39181b0d1e2.html
Resource
win10v2004-20231215-en
General
-
Target
84c35d82db5d35f2f0a7e39181b0d1e2.html
-
Size
22KB
-
MD5
84c35d82db5d35f2f0a7e39181b0d1e2
-
SHA1
b8e711759804ff104ca9a135338cd664991094e7
-
SHA256
c74f12cbd3019df8d323e60c6c404ab45e3a00a80dad7d8aa837fff5e37b1577
-
SHA512
8441ec8ccfe235f996e3bd8f529f4745e9c75e393bb7d42e6de5a5dbbea726044aef06495c7e06c70e09e139b09cd9cb18fd40eb7208e8ecf3d4377f3e2b6aab
-
SSDEEP
192:SatweGuECfhL5FyTs6YpbQau6G6papsaXpqlsdr000hpVaepdr000UpS08000s22:dhL5FGYTDpa/wCednXRQJPvwU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000073be8bbecc105e2a6670e98233b96584e07e5bfe5356f3d9d0ad9cb6e5cbe0b3000000000e8000000002000020000000520b7da639acd498d9485536c4f1bb9aa8a5503789b181d133df47e47cd0e6f920000000662f795bba5774b8c5e40b19841acfb6a6509a5cd1c917747051874a3ca48e0e40000000b3d0ceb19e1832f9d8a34ea4261c298717c01df1dfef9307ca57f1d1b07c1309273f5cb26b0a659f1c26dcbfa2b98da4d4bc3564dcf2d802a0466267eeab2ed9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0af3007a835da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32406D71-A19B-11EE-AD90-6A1079A24C90} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409501714" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 812 iexplore.exe 812 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 812 wrote to memory of 2456 812 iexplore.exe 28 PID 812 wrote to memory of 2456 812 iexplore.exe 28 PID 812 wrote to memory of 2456 812 iexplore.exe 28 PID 812 wrote to memory of 2456 812 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84c35d82db5d35f2f0a7e39181b0d1e2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c934933f3756fedaeeb98295f2d6d0f
SHA1f6d492d9271115243bfd3d1f6aa71c65cc4cfdfc
SHA256c9c9be96756b4004e812ac67db19da4b922bd11a5eb15cc61c95326faf437eb5
SHA512111491ecd076a7bf83c1ac6bc4003e397560caf537997b2d2b1a8854d9232e9cf601361a7f219029ceda8d6eb830ae55b908185a440b5d4c955bedfa78353abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f76d6931af7aac2184e1ca24df43e7fa
SHA16c8601cf03237ad725d6af898c7ef278f1119bee
SHA25690a1e5985ccbb53a02665ff24f85f2bd32b149b2f6e66dd1f2b9bd42fdbd4ca6
SHA5128651c3712c27ba04f13812e1ccca7ad1123ad9957ce81b23de0485c8f1cea629f6fdb4b90161463e0ef17e85f2e9330fe048d83cc7a0a6c647482fafaf627932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53375b895d09e38aff0faf3875ffd7ac7
SHA1a089c41bb28967346d2ec37b5858ad9e4b180d8c
SHA256a830c4ecf1bcf12070e6f87053ba955a4f0392fe3baf5bd7dfc163cd80ca7e9b
SHA512fe1245bc396197cf9064a4e607bc5fbf255bcdc684e8f4e21f57a258c1a4fa185a12ae887fd8adaeead680b1241f378dac1e9637077207e2d87a99d5f5080f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506097cb51b60012bcb38d690dee86a18
SHA12af2306a737f11c2d6a6858837e481baf9424309
SHA256542852282333226aeddd06f8ad374e5adc28196e31cf6922d67ff9c494fdfa09
SHA512d6d2deda9f35817898a6eda5d082620c5c884c468265449d7456ea286fb76c1bc91d992dc24b7bacb5795506f1bb6e5b889ed69b268d892c4547d1b87c37e4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d2b5f4bc726f289307bba82bb6774f7
SHA15396c2a6a3a5a1af1b905966de9067c42c66df1d
SHA256bf70fdfd1ab8d83dfe7d4755f62862e50dd5ff80d9d8610622a274ef96d54259
SHA512f5ff9e21bf39ffc874123b751bf95c2ebcf042570e42d7a10bcaca6ad33125dc67a48c6073c193d2c869dd6b2f45eb4acb4807d5269c130ac3c4cb0a220d49a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5687dfc8de600f449e0e395e75fcb2f13
SHA10f3ea85b40750f5bf67589404741c1c6715809fb
SHA256b440f6609ba62dd79763ad3b590b4c1f094d2f55c147d09b75b66f1d91bf2053
SHA51280b61f48ff75369fc56c7ee55a2df91ead51d634d99c05a236367ec925ea6267643488f4a6f4238ff9d8da37fa4ed20094066ee7d3cf4ef3efa4e36c4c55c2a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6b4ff074dc688b6fc407a091ff18e2f
SHA1e27fdecb172d7d70c9322d8cd5e95a9479147a29
SHA256d0fbfc6b0b7503dbe121e3d73f4484b0bb1d5d710fc64a867d450409fcccc6af
SHA51244db34fcaa48afd444f77448c30d006d6ec857af48284d1ee29d9726bb39607448d1ff46447b20bea45164e95bbe95fa3fb125edfbf5b71bc2533199fb940111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568c7a2e6092dc357cc95ea350293d965
SHA18bd5536270d7f9d331d204736d950042cdc8c52e
SHA2564e2d30b5a27b45bdf8183d4d57fd9f2bd3c4a5379a6ef3d02aa61ada3ad066da
SHA51258fd365bece637796ae6bd50de2ca4396d6ae0244e9be9f7699fae01a1a3604f4a5e1547b7603d1cb105d8cb5862bc3cbb41c4d55a85eb7fcb15a0131818fa72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d83426d6d2685e40f709b5c49b03f44
SHA1d063cb13c1d0a30dca17c7a29c43ef3964ed56fc
SHA256ffa884f302c9d13ded82966b070b469d525d83aebab685744c1bc6f78ca5639c
SHA512f2aa787833e1de568b241e99620e7b892ff486f3f3a0454ce818f1a6b2df4ccbdd0b77c7fd521abc362e5e80acf7b4e579c74e0254f45f09df2e88306ace87ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac42127d2e95fb61fb2be68207d4830d
SHA1d58cf94f7e07274111384a51f674613210c62499
SHA2563dc2a01522dd3781e6e7b95e2bbcf4a8c28bb62479e70886e60cbad3355a4bb4
SHA51218e64b7acf3774d86b2f4e02daa00c462ee116caa59b189ed162dbcbf90300827b741592daa2b67eddb63d0b6af8f73c80f9ef8cd381b8ce1b165816bd6f43e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55345d7b0bd13476703038d054284fa22
SHA16be4f551c86f39f85530d207284f56a3bcf5077d
SHA25603bb1a899c5324db0810cbd6fae1ed5ead63075e7470b1c31970a00d2a5effbc
SHA512cc0349629b518e52fce1742d340495b211e8086dcf9f926501d5c5a621d5d5573e924e07e5f902a3a0bd9a84cdb50c3fbba4d4e6cb6def28cb97f8a346b1bef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58173ee5f3465f0799eed82b22876c01b
SHA1a16c36c6e7c5b29f9e32d179922870fa85c4e799
SHA256b7ed3187635a829e39f6c08d78b3572a32167c38512d7af92dd920fdd123e665
SHA512f40e8aa06ed24d158b1072c8644d3cce97f1336b17efe1e0e16663d373a0fc37aa38a407251e75be0d11e6437f3a7e1a6da021e50f9d78ccb1a4dc9069b35b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d45f0993cd2f350124869c6ac3a5408
SHA1cb6506ca2d746653a123895177cb889967080e4c
SHA256d68da38f1ec676df2020d0396038d575e7585839114f51603eaf5b4180f6eda0
SHA51294ed64f2d5048126ae25dd81e7eda55f8c74907447cbe922e81732a41927211f046923c5db781b4fa9047e2b99ba8acd623a5a1d00e78e7d6959d4845846c02c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06