Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
9060ef18c022d9fcf8f1c4aee0fb68e7.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9060ef18c022d9fcf8f1c4aee0fb68e7.html
Resource
win10v2004-20231215-en
General
-
Target
9060ef18c022d9fcf8f1c4aee0fb68e7.html
-
Size
4KB
-
MD5
9060ef18c022d9fcf8f1c4aee0fb68e7
-
SHA1
e735203227935241f79c348d030f621216c245d6
-
SHA256
91ec168da40eb76e021122013da01c779650b21e9a1b554a0d00ede5da4ce381
-
SHA512
837ca31503656a43b3a4dc1afd1eacf837d56627cdd9666ccea802e897dc74b25a7fcbd0a2706f8152d93cc82fc6c2a192fd6c936ff04f83d4ac3ca71ccab559
-
SSDEEP
96:rf9seakGiwLsvfpFFOxUE2vBUqsOeN0Eg9jag0MwU:rf9FaL7LQFIa5vBRlVEg9+g0MwU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a0000000002000000000010660000000100002000000077b6e16d79ffb9ec8281d1d435e673a7c3312ee3fae6a352a8a47006825c18d2000000000e800000000200002000000062acd87d44c45f621c425f153eff56f5c0e9bc1747c59b59789f742d031d4c4f20000000f9cbbba5e5f301a74d8245dcc8241a74f8b03e86b1ce821a82a284a04330c82640000000d1a935198502611e9487331763d399483ea14c31532d4c331d0635f128a640581a0de5c5b419da0d5538460f70771e0745f0ce18372d753939cadb0826bb04db iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1080F71-A1AB-11EE-B0F5-76D8C56D161B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2088a6a5b835da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000006a48de2dc9932ae9fbda5164d5283860721885e8c05ad8aecc2a73fe200c0743000000000e800000000200002000000019ab0244c6534ab00bebefe5d8e9575b91d0b17d7ee891717a2d0355ce2fbe8590000000fe0a59d4bddc35bea930b2f539ed225324ed2cd25690574f568f4022ae51178b4a6838036f9a233d69b5591ca47f3cfb89efbfaae7b51f628cfa8f8b2e703e71833a9ac382d54333a041d56361237def36e821809506c2b6951d6c46097e089bd20bc9f2029aa39d9be19ef3e4b77d6aeb60bff705a7551ac659c6e71ab7e7801a25ee02494e134ee1dab9fb0888998d4000000074db7ffc03eeaa581f8621ab85123fc1411b40b51ec200c77e38815619207b8d4a9efcf6b83234690e745be18d0153fa47506c51d27a8aa04b7775984032fcc0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409508855" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1056 iexplore.exe 1056 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2192 1056 iexplore.exe 28 PID 1056 wrote to memory of 2192 1056 iexplore.exe 28 PID 1056 wrote to memory of 2192 1056 iexplore.exe 28 PID 1056 wrote to memory of 2192 1056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9060ef18c022d9fcf8f1c4aee0fb68e7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519016279a029f183d2ce1ff70c5bd003
SHA1123ca6cfc8707383d779d6714b7fa56f8e5b5a62
SHA25680885d8ec68c6e7cd812ff9bd19367485b707e0addf4a9b4df4d0ec071482f5e
SHA5122cc0a27bfb518c4d94b390c093772689ae7667ff148de59e32b146d738fc8eeb1f5a30890c55475a03678f6cb8ef122e09ae4379e27893b1b72f546eed96326c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b0dac6b64898d0064214d19242e314a
SHA1ac582b63cbd9bca023531ae7132f4ca615407a7e
SHA2563976d7977f0f1293ceaeb80fdaa5a916e379a7cd085653aec6eeec8214e61b61
SHA5120ec3b3827d09c458f0e1463c2414c7b9098ff66f20e2b255f7629f279c0a82efaac076e497f8e3f9f51d00c4b4cd9c58ad8ad5a456fea305d53f1906f328635a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5784be7a97921593d923b7c1994fccad7
SHA158832addc28a997dba1a6e7c6ef81a73df227aed
SHA2561236b747d8958dd0c8350f925aeaf9b30982caa3bc6ae72e1426d54dcbba3a34
SHA5129ae5ca985806a076b4762ee3126afb7eb13c5545374081fae442abe838f02e0f9e8b76e97b589e9e621d06abb627c2ae118cf97b4dd913707f2c653a22252149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5419fdc89c194d538bf4c2f2e40619bfd
SHA144cbcd23b696aefe6956a80155ed3a851ec8e1eb
SHA25673e76848b66facdbd9c097cbd0ac4d18d5b6290c47b60baca43a924d4a01e6ff
SHA5125a8eef1a436b0517905bbd7de0f1b49d029da0ec50b02fb20ad6cea37307dec347c67bb22744cf9c7c0554ab5a0aae7f6ec8fdbf14685dc741fb6942cbdb88e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fef2750670bb9322dcc1ab52579f1a7
SHA1e5d8d66b24cce815363d04f3cd2bf7fd95d03595
SHA2564c2061ced836491aa712c344514fb86bc5f92f5ac75211cafa38b18e34524cc2
SHA5122949eadfc056868ff1d200aabc8df0b4a996e6ad45e69a96490c10b677490079269badc615e4d6f811e20e7c1bca55a245872046ced3168dacbbb72ab6f9eeef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b09d8294bca071dbd19c79c93eb094e9
SHA1d77ad06c290a5791d0ee70d11a82ec6c3f232a30
SHA2561eaa3be23ad87245115c4123ea809ccd25f7d44e3278ebddc0c18f7e162116d4
SHA512462b93e86ff4d439a2585991fba9336ccd0e285dc103444760872a21d59120e7973dc335b5d2b90b8bc60e5b02725fb00df379b43d048c04bfc4b31bbd8b270c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bd19d2f82e0964a03b61afe6fb36a70
SHA1c44413cc300d1cfa422c465cd5b391c5cab32c2b
SHA25631548f9072d36e3fdeb901aad2da3e38e47faf67b2b564eb9bd9e942e718bf3b
SHA512e59f15b6082537026b5fdf28f7910ff0041b6ff4795eaba07cf002f974a1ea5f9fbb887576128273f175db36b96e7d052b7cee8b218f6d32ec8f93f3b0728228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eadfc54e225afd3abc30ac3cfc1a2e65
SHA1313c94c1d8febacc14a6f31fefbddf36f32b8f2c
SHA256a875f6239f8d72a25e3afcfcb19625d7e6754832a9b21b469294f0c79fdb6aa1
SHA5129d3715973bf0e3af51c887a7286cb460f6fe71b20ba664e5eb1c5d65b17a798ea73114db9ad6ba68ad60bef606e194ca162266a35df21c841ca20a7ad4afb13c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e43bd1a7786e4b94134fa3237471955e
SHA1426854a0e0c716fb57a6a4c3073fdcce831aedd3
SHA2568272a5be292aa02764a5f5aad85ed85c890f1556980f20d3fb27e5e685761660
SHA512cf1826985b3115f054b218f2594deeab94365697ec120ea12b841e99e6f7a021e72f5a718d48bfcabaf947a104bd98935588fc7337234fb08f153b82155bca6c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06