Analysis
-
max time kernel
120s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:43
Static task
static1
Behavioral task
behavioral1
Sample
ab607417a6c193c4651c85d1119b074a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ab607417a6c193c4651c85d1119b074a.html
Resource
win10v2004-20231215-en
General
-
Target
ab607417a6c193c4651c85d1119b074a.html
-
Size
51KB
-
MD5
ab607417a6c193c4651c85d1119b074a
-
SHA1
7065066c9cd71cb5ab994eb44e75359be2dec15f
-
SHA256
09aae05c0a35d5849faf919c38898d3cad3591016516b898560f215aed7d25ae
-
SHA512
f363f08f96e8c9486e894ea3eb98938ae1abc3b92fde34973c37941b0bf72a41cc9905205dc7807bba1a2b071e93e92d3a569f05710edf7288f1b15328477105
-
SSDEEP
1536:bIRIOITIwIgIpKZgNDyIwIGI5IrJ7SvIRIOITIwIgIiKZgNDfIwIGI5ITJ7Sdrn6:Jrne1pkbdbQL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1013ba6fed34da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{898B5381-A0E0-11EE-8183-5E688C03EF37} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409421559" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd769173341890000000002000000000010660000000100002000000071d248bd04de022b8586e37aa7b6e7ccaca936173dac89d1ae2db3d9db09c408000000000e8000000002000020000000cdc98c8184e83009e1f1d26c7207c891a3c2d4ca898e073bbd69fe5e82b67917200000005a6a3d845ae95b972bb949cb39c02b16bee878fdf6975e053f82b2209d6c77e14000000002a61e5fae56cb129b2257813875c5b546201664c978b63ae94f08ebfeaf498107de8dbb315af83610ab994fed3e8764bd1fdcdb210c2b7a648a3f5e3a3987e7 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1956 2000 iexplore.exe 28 PID 2000 wrote to memory of 1956 2000 iexplore.exe 28 PID 2000 wrote to memory of 1956 2000 iexplore.exe 28 PID 2000 wrote to memory of 1956 2000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab607417a6c193c4651c85d1119b074a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587be4fa97338912575117470d71c1546
SHA166f65b99c9c3baa12a97475b2e3073b59fcf3e9b
SHA25643f635972c42959043fe63ff6844770f1b3c2a3e7257478fb57f576ab247a7f6
SHA512577955baa113b1bc040b18d6e30e1603c34f3872205e79ffec36dbe7ab1bf79b87f120a36c77f2f3801935211a1e5eaa57725ef94e2ee4467358ff6faaf33011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58346e5a99bf299dce2dba1eeebcc1de4
SHA10e869119aae92beb14cca74812eb387e96137eac
SHA256043c81e9dac2f78158cc6b9bfc3b20af89550e570366d7a0a9444129b688f56a
SHA51260a39588c0b02d8e78e0d5a27f90eb6333a2950ce4e9dc4ce7f3c1eec43cf74646bdfe8fed05591e6288605e42f1a8a7e1941b58f04b1f4e9c8983c2e931ce44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54284f59f8c0731137cbd597116eddf45
SHA1189c54bc856ed3c883d51be504d88f88f681253c
SHA25687ecd86c5af962ca507a9028fcd23a0e141ad750b69162f78eaf7e6c443ed1ae
SHA512aa8e440364946632f03a4250745c6b01d03d96750e15cdd80c31d6eb21d2f18fbce7913330835bad611f85b0b4eaca6f02040014792d3607940a7174910df38d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53764d65c4d030a6af9819aaa6b0f7907
SHA13763b3dd2816ed054fd2c3b46a24b5c83ea0eb62
SHA2569dbf82b1b95446fb7d6840bf1662b75bb875fad8512cf96d9f90bc7a0355ae25
SHA512ccd8ab2278d93ce1dee7fd37287288cc8d4a843aa239bfe520470b0a9b93eb2472bc92684c9f96570ce914869d1d6ee8780302e159f36ac5465d84eb7b9126f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5779be5c05938a6e471e969d1963ab791
SHA10a282f56e2961d9cf04885344fbc8e4bdf4b0f06
SHA25692f25258c9f79fdbfde383850749dba16e19b09ca305889bff8fdd5af207857f
SHA512247cf1a4e24aa6559169c75d25c433ceee0a4c15d840258126001030fae2ac597bd9c8717c2b2c1a1b5674e0fc2250d9bce011dbfd97d53f6d04336ddd5253fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f341fc224e2fd392ea052c7201f614c
SHA16370e06d67dc4660c10c9da619fc85b5c7933c9e
SHA256b2eb030b9d528a666e2539c4c93119663877247184691900da9825b151a07ae3
SHA512a85b4d375d6d07bc02ee3208eb217aaa5f0a911da97fa9b3371e8b6a9bcb222da1dc76d718a413e4d4f5c4e6ccf800ab8070e55624b0ce80f8a1a5c7f75a9a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fc8fc062704dab2c70e9e8148a76b4b
SHA15f5b1e54a84c89fc7ea34c24995f044d358e4d2a
SHA256900bf406ac42b1be9fc1f9ec65810ca03aa05c20c347ac6289666d0c8461b724
SHA512cd5866bf9f670619e069d9542bdf0a7a4f8df0799ad7ae2386cd455bafdfeea93763cce56576ef5a6240530964a9d6f243f569aab579953f3c203329a3771f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d8649fdcd6ab8aa3989a62066bfa8e1
SHA1ddd7e987fb49274a68e0754f0be79adcc1589d96
SHA256e775ebfe242ba35cc20d4a0cc7cb4d9e793791e64d6a7c72b4d8a4516cd1ba71
SHA51280af319bcae19b990b75c8fcf503312574026bdb37289234b4df33986de125c022eadf162d3913f79db1ea3065f3e10fcdf9903a6eb62bb65d65c29902221b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e666bb0c1d37223f6ca59431a53f182a
SHA1b35a4f90d3efecfc20d4a58e4664bc2171825de3
SHA2562d1b850289eec7beec75b5e1db926b48eb8b260cd9b26a2482364d5d65acb047
SHA512f2b062e2e9d19fa22240fca5026d7ccf68f6150a178aace704c3a7824d4420564de681f6aa543ab473c8123a256944089b70a9a691bd6fa28f3ecdcaece5729d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce3d34b6fccb12a646e298c2f2895054
SHA1baa563c050498cddb41711d111a4dffd6b934bb7
SHA256e47d81996f1065e06f9c8726a6ceb7b29adf94e5319a2b562779682dd2b905dc
SHA512be1a2762a21b4476603a365efa5c65aa9ac6a74aefa994b2c693e503029c7cab8a0ddee7a82ce2bdd612de54da12a72356f6b9aee982f9903ec5522691c66e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1fd2e53d7e8e6ad4d0ca4d17892266b
SHA1153b36ad5ca211421845e0a9f417326997b55977
SHA256ee0e1c788c109d1bcfea38b9f1fe369c98a59f24447372763691fb1584db26e6
SHA512bb32feb14952618f4e618fce563476da36f5b4a37a9cb593525e4ebb6d75a1d4ca7c413913cd4d249b14c39896f42b5f948a843a38773f97e9bc8850d3107307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5564159d36486412c54cba7339dea086c
SHA13e701c528e8a8a0920eb67b16dd849e2cf08a0fc
SHA2563bce7581081b1c3d03c208640a9095923f8fa7302ca1bbb1d0e9928723c3d1ed
SHA51287e2107753ca73e8a4cc87e63bf4078ddd53e8ff30b3701f6d4499aea9a96c40696523a98c99dfe8a2759e9d603928eeb900015a3952affe4961e260c8a73f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507e042e109b4d15a22948eeb523a57ae
SHA16c01b2809479761220b5f75959d465e3ec20d745
SHA256192e7c78e159a4ceaf3f49ce8b5610476aae68b34c84106e87138638668a4fc9
SHA512dffaf9a2f9fb83abf5a9dab095185ac222379fd570c07aac90b2e8cd1b6590045059457c58e5dfe683c8697fc08e431d17f08ff44383e0f6ab4a056798e81da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532770dfbc8e5292fe94cd5f9dbed5db3
SHA1076a04618b6897848b80b42aef124a207d47d94b
SHA25665ef42d22add9eed8cb3a763193bc6260710e84f42fe3e3802643b6462d38bec
SHA512f8c1d58590d8efc218b4fe1677f7be32cd22e7c4152a3fb6ec07ad553465d70c270d92df45717a12f8b7149fc50138a49f8840790d9ad8655e7a41a3fa8a8446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d78e7e77ac5165099210875f8818938d
SHA1d7fd10113fc53360fd631fcde2938bc2ab09c465
SHA256a29cf9d04f90a8126dadd373cd45ecb6d62ef8d53ab327d7366d94187ad0da0f
SHA51294e51cf041936eec2fdfc8b25263d2c5ff9766cef22bfe71c0b6d85596338de0b4a4de78e35d7bff087696c151338d3a4868fb894794f8ef30959cb510a419cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df0939090ef15c239809769feea5ab59
SHA174e9eb5422bd9dd6965b0d51d9e9e32c2bda300b
SHA256fcf2b4b4c29a38c739909caaa0a0b8fc7d516e74074e6b1817f26d06cf6f44bc
SHA51230fd5a2e3c3a1d577c7a781e99242406d6dbb7904730c788b9dd353ae01945ba4ce78d40d42d896b1d7b1924c1df7380aa97b96d3e3eaeda8e9b98befb39ce56
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06