Analysis
-
max time kernel
65s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 11:24
Static task
static1
Behavioral task
behavioral1
Sample
885419bd631ccf7bfeb2d3d9613f8e46.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
885419bd631ccf7bfeb2d3d9613f8e46.html
Resource
win10v2004-20231215-en
General
-
Target
885419bd631ccf7bfeb2d3d9613f8e46.html
-
Size
2KB
-
MD5
885419bd631ccf7bfeb2d3d9613f8e46
-
SHA1
93c55d88466b0dfac9c710e79c02d2edf96712b1
-
SHA256
d893a2613139e18db77a5b4264c8904f9e5746eace7cb7b9becbc89da1aaa65d
-
SHA512
51a1e8ed109f4b8a90586673d5f4a9f7b386f54c4d1054101a2384e5065dd6ff4adfb7688ceba1463820b6749538ff2d49cd5144e1fb43bd63fea4fe8bd40f82
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000ea36edc178cee47e6d2d3f8e88095ee873f656aef9e4ff45bcea99f81b702f2f000000000e8000000002000020000000dbcb6162829d11ef1efb199e02cc3f6126ce42ce80e14b45f48fc7885b03e08f200000001cacd45d420a1f69fab7efbe63dcec15ddea8d84654fb0248a3236e10cf415bf40000000adf4606dfd75a0aad0df1b120b908af1f52a24abdf18e8f488044b064c11a4da7bb17fc39e40a5105d1302f5e89e643e36f4c3d46ffcc713e81716af5fcbb0de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B13C4161-A0BC-11EE-9439-EAAD54D9E991} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0058cf85c934da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2492 iexplore.exe 2492 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2124 2492 iexplore.exe 28 PID 2492 wrote to memory of 2124 2492 iexplore.exe 28 PID 2492 wrote to memory of 2124 2492 iexplore.exe 28 PID 2492 wrote to memory of 2124 2492 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\885419bd631ccf7bfeb2d3d9613f8e46.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d093e186b5d8de3b731994b2da7601c
SHA1c6f962373d3591c7e7c78ca362787afa03e983fb
SHA256ad5ddfd4ff63ce50bdd8ddc8f6b01efbbdebd7a5fa466d3b6d28bdd3e581d097
SHA5125e4807571f1f9c5e246126ec6d4b577ffde636976273cb29c3da79be905cbf2917d855b52e40d3c7a5e4c279c4bdf05fe8006560c89a7b918b2555eb2257811a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ed5de9e812e638ae097af648ba536fd
SHA11ff6fe031c1bdda8860651537c6111d18394c0d8
SHA2568422e5b44f6f7e9358b3d837684f2e6e59ceb483c36925e99a909292ef671d4c
SHA51233f1ddb488b19e9de3abb85ed270c15c5d91d25fcaf46767edbf815361dba00febb86f6c5db31e17d8ad9c2e54cfe33befff2eda536944ea36035dd4e36adcc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0bc361220a44ca1689eaa231d60b9f3
SHA190a3a80bddb45dac9d78708e43d153ff4693318d
SHA2561984e039f633d617dd012fec42e25357174851104d9848ba37a855f81934ea18
SHA512e36a1b4c2ced3558ae1ee6c06a9f5f523d889705d975312dc25f93ae928c29add775efda08c1936d85f11244da38c3663aa98589d6fad3ce58d3574c4fc7e878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55262641fd9c6ef153b73eb31fb2623ba
SHA17e239c28ae9435b5d8ec4ab783d47529a93ba0d1
SHA2567547d6ce3e5d5385fd3957afbd40962d2c7f4d6273613dab83839091ed0d8f6e
SHA51299109677039c1dc3518e6ac56bbe45735b14ce702fb1b8dc55adad29fe8ed050aa8df12a6bc53f51b2ccc81e2582a7e77d55d541e16be0e7e4fb71d550e5d1be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e2f902e7532704dbbc2f6f319073e61
SHA13418a34f616cdf520297f7df92cf5114036f0680
SHA256f0b50f2c3c73f8437f2f4967e7b8667ee89028245cfb2f83dfb9ea21f8153c15
SHA5128772eca995ffdf8273ea0e261b976fb9b66e7616f494d8db770a61a75c60046d06ff2425939fdc21e15b75ac1a8152f541034d85ac9017d22f7c1b1e1114a2fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9693e7ed13d1419991af4fa257f6c53
SHA160584c68792d9859e8379aa11b53371720476eb4
SHA2561c7126e1b81cfd8eae89b1b31f0abd44e626f1337211a9d46dad48bc83cb18aa
SHA512841e7ccf92800832f511aac82f4b83f0127432ad1fbead9f4485b0d11fec30a5ff2ae5e94eaa431c83cef1382fa7b864010b491b3166fe848a9069e64484108c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58be84b9982167057d21e32cc56082c99
SHA1f60d97aea768b49924267db12f9f61178f2d8e8d
SHA2560dbbaed0338c8adcaf76ce4257d87fb4c156b0371e7aba11cd77cc4a5dec2140
SHA512c56844baae86497ae5ff9b364d5d7698c850bec9647c7e7e56baa1af765b941a154cf0788656c80fa74a972dff5ee9d83ef91a4c6c1f30d13ab99830eb286893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a62179adc51798c649f4ece571d521b
SHA1f57c5f9e4f956ac5006c1f81cc74598b58cdbe2e
SHA2565ff72ca5162fff26d23822e74be421ee453c2c1e00f8f5a586abb9f9d83a42ab
SHA51245f036c9756c46487ae6c3563af3618da03f56b3d9f26b29a402323ccc01bda5b76e6929071fc6955968a81a60ec98bd79fbf799f38bc8dc79c6c1925a6e5356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571e22dcb4968c5ae6e37ee5fb142c299
SHA19800af1adc7f1d15efcd595d71cf4ac358b0c6d3
SHA256b95d6e204b771ed704a0df7fa52994df13f7306b8eea4ad9927f7e1d84f92d78
SHA51293bacbf1fed4f0b244b8f257e11345a89a026bf4d6d31d58c8bb59214e3255eeba437913b8c793c0c2f693a8d1572d2a42ffcba77db1689755af79d77a9172ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556691cf0902e6eab881d6841b89d3a89
SHA1e4154ed4f32ad67403976ef7bd11d94df769dd9c
SHA256564bfaf1b3a4f1491d1c94fa456f5284f4ed20d24d920650458085763f391866
SHA512e298de44e9b834b58169e1d33fa9264e7bc78b75118360ba2693e3613f983f93a92353eab54951eeb15af6fdc7765eca7828bbe02d68c7977d27df6eb79badef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560019bb94af1cdc8b73ca20e4085f718
SHA1a9f0221f81d68c4588429c2f7e42d52b6e4e4a8c
SHA256691554885c27a081bcf83f59893d25a7d5d2885a216d31860e36d226f5fc9d28
SHA512dfd6d2183d78f35ee8cea94622f7312f69925276d66c2d06a7f416da7aefd27b4a02482699b05ea5b950666e3aea3f33005f5dad700f9b8d05ac197bdbf7221c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549575513683d1bf9091f9b72d7920b88
SHA1d9ff3561a483d3ecb15ce07d39aee680908256d4
SHA25612cdb70ff361afc960b9e0957493807e0de0fef0bbf527de43cd62cfb06cb7b7
SHA5121423ba43035e9c1ed54b5867f2995ebed29339d02c3762ac5f275f987062c80e7871c4c83fbb67cc6e8fbb21562280ba09a103ff929b7c922dd0d60798f696a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c36f257cd21e07338d7bf4f35eb97143
SHA1fe2b8209e23ba3019117850f259c3001feca592d
SHA2566c7ffcda7537794744924b8123d6e100a0e0da8c678821ca7b8ddac5bc7c928d
SHA51254a8539dacb15fc36808aa07c29eef61480ed4500f20d32c6844af8a62492e20c6f8bd4d94479b51aa70d50423e8a4d1d2201cbc2cf90bd1393536a426917c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5692a3152d971c2ea9ff94d46af07403e
SHA1c213a069625d977e611d1c9d3b1ee883b7f7ed52
SHA2561dcb1819c887745b89a8042a1c8cc228841351774cb8e752de0ae8c059c8b1cc
SHA5124ec4e3a5bc5093e82c84fcfd358265f066838ffcf9ef773324b2f673db9ae21112c014898e84506ae0aec6bb8f5127be83088213ee10e9462ad1a45823a953cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509d543a2b30127f083f6466d81182a9b
SHA1192c3db503458a0cff630845359be88c27263a30
SHA2565b8d5f911397ced22ea95e5abcc75125e05d3d95b08ee2a263d4bfdc305f1208
SHA512210d931167003cdde63a1c4e4d381cefbafb9c3f39e7cab7c1b18cd5ad54e79a4ca8bb4ed93cabbd24cd2948bf9274ed0c35ba0870047f6c2be25aa856e93bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5169c110fcdda7f446ba16ff841c815b7
SHA185bd5b57d7f28dff0ac30f8c1b2f304c91958ec8
SHA25622498b066e719add1be9b13392cd05600c1e3fc5056e5365a29b16ccd438d299
SHA512a59a7a800099555e53b53fa4060e81d5c8c395c90eb132d5ea0fb1832c07e822da0d23235bd831450812b0314225bf9cd0a650777386f8c811c5ef0d10cca28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a214e4e8e114bd64ffeb762a90472089
SHA1acd302bda0633a3a6861ec2be09cc9bb9f5c03be
SHA25640d1e81e20716632b8acbff1ca6af376e96ff370f89a8fa09b923a28b3a17d2f
SHA512aae7a0e7601f85d10c348afc5331ca1bf9fb350ff596fe366d473bcdefeadca9375d7f703010cc404f7b4710bf1e21b1204369a4d41fcff2d5482b191fe24c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579a30b39d7b92361fa9e4b1a3a95d3e3
SHA197b80d72dda3c08c61f57ce38fd175c4b8661024
SHA2562056b366e5c254f4dddee0851c0140f1cabc9897c43b6bb713233b71a0ad7e50
SHA512530e20717cd04537e54c1c1f20b929579608da836eb208c7fe37605210a206d51099333ee39b6763cc9d4022ac33656152371026bf802a5f0b866c09c2014f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54955c1f783a2070ca5c913be4f28f3f3
SHA1be19730f47ae28db475269baeec3bb94117fb370
SHA25615ddc56d6e167d67c8dd5c60a7f75d2b8e7cac4301e09d0b7836c25a56369801
SHA512c05d57ecc72ccd88a783475b03f42b7015f122aa3cbdf623916a88368ee57b5a1dfa1505d56e80940d2a907630535f3d6540e2b7223910895f09842cc98cc068
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06