Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
a8d43dbe280904d8f61502f488a26cd7.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a8d43dbe280904d8f61502f488a26cd7.html
Resource
win10v2004-20231215-en
General
-
Target
a8d43dbe280904d8f61502f488a26cd7.html
-
Size
42KB
-
MD5
a8d43dbe280904d8f61502f488a26cd7
-
SHA1
2f62d12192443d435bcd382d8f004b2e87627ecc
-
SHA256
dc74e3bb2f97b83a520d43757b71cc9ec26de04d327b9031de477abdba8af2b1
-
SHA512
7359c21b07c9c803a676d4dcf3dd67e4ec9d19630bc7bf08224a2f0ce1061d2ffda979e94998170ac46ceecf3d434aafae0a286a27370820087cd70df2447908
-
SSDEEP
768:IQpMIRIOITIwIgI4KZgNDlIwIGI5IMJ7StIRIOITIwIgIfKZgNDfIwIGI5IVJ7Sg:IQpMIRIOITIwIgI4KZgNDlIwIGI5IMJf
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307f9019eb34da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4375EDD1-A0DE-11EE-8495-CEEF1DCBEAFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000ca41d32bed55b9e9d9717ea3a75e1cde8ca2e459af2c3ca38a4085d668c5ee0c000000000e800000000200002000000027ead0e5f51bc51fdd0c8cd029b58dc43ab9ad37c8dcf5b7798ef7b8d9b4768320000000623e5996e58bb5860ad6b29dbc3ffe56a26d316d43a7aefc3309e419fd6757664000000080a4d8ed1dd90991d6bf38d1980a375b86eabb7176234442fac8c042a0c8dc5d2b7c3a43b4fbff429c28f9d45d4151a120b2332db889edb4cc259bc62798f3b9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409420565" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2376 2200 iexplore.exe 28 PID 2200 wrote to memory of 2376 2200 iexplore.exe 28 PID 2200 wrote to memory of 2376 2200 iexplore.exe 28 PID 2200 wrote to memory of 2376 2200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a8d43dbe280904d8f61502f488a26cd7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55eae352b5274749dfc9540abe2da3585
SHA1879095dfb3c4c1a1fe706c6648c80948774e2992
SHA256f19f2a32cdac180de36dbfd7df65231ab99d9b6ecda7789f6faf52450c44b405
SHA5126fcaca6340a26be4e4e2999877190f562f1c222c232acecb6e82ca3c8db347279bb81a0beb6304e514c378bf7e748d037597d49b6ca210689b0d365f04c00282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e90c32e703e1b09f86b94b1b75bfbbc6
SHA1b9071caec15137f0144f51c156bfc2a7f55009cf
SHA256daee5606d3ca201b50274728add859bfe8e5d9d39b6d277dc2263f03bf1f258e
SHA512eef9374f5363647d718e3c3b06e3f45c300c37b65c7fac7f8f2072a38f402e455922ba58d1e6834768b729254af6f6f9142bcbf8d3ab074535897e2f37214287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e93318e307dc3d51c12bc367f920c405
SHA1beffda1b1d20ac29e915a411793e6772f1312797
SHA256fa4763d96b7ed838dfe857a5af0bd67dfc2d396844f6ff966b0af16a97e5d572
SHA5125aab2417ffb6f2e176deda03d6c8f74ce106a225e998ef1c7b2eb576c2c28d0bdbecae56ac34b32bf4241ddb2ee9691df538f19ab0b1cbb95adc6c73c05f4077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3602cbac81cc4fe66ee5ef111efd1e7
SHA13a6a0b4be2695d65f72654bb1178afe29d069896
SHA25668e37f543bf1e73355b3af0d9aa1a6bd2a5bebcc6b89fc7c1422955c7e68ab1a
SHA512d7ad0d7d5b3f574bf8a7d63d9e2d22294a2ab95f446e3c33842578b6156005cd00dd3ab7c192ce5dc8dfa3625b5c993932e7c132e23e22a9a42b5aecd77948ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c28086ec16b7dd3d3bdc0f945c8d8ad4
SHA10ef37d40a7e0c42980be847da8892a37c4b504a2
SHA256daadd9e193e42050beb5ad655e97fc8715e6461018a6aab544cb18f288b410c8
SHA512fb2d1d1010efed1254e1df2f4db35be1caef76aa7aec9e6d0b361b28bd0a4925481b27f10693fadfc539a9113275b9bff9ccdc1a1318dcaccbad4120d3210b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595ffe30caad11aac3eb7884c382e0bbe
SHA19ab559a1ff283fac54d37d4fdb30be5acb1022d0
SHA2563646b6d8ad313e7b4976b18a5a1fb26848a4b169177865e56f8731a24de0be8d
SHA512cf9f7fd906cc4dd7d829b08c2c9792e45be461584154fff10a6f6b507ba112926bdf9907478d258b8f887aa41e082dbb8c38bcfcb573ee33847b6e293d742cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f3e68c2c317601db18208a6b729467a
SHA15bc55c91d6c71cae921a093a2c285ac398b022da
SHA25650c682685bbdff28794c76ab58ab5b171696420b738bc23820ad7e6a7c84ea25
SHA5124f111c00179887944fc71118debe7c742109cb8fe6c3707bcf2f16c6bf34936b8f8beba0d19347de6701b4b3881658028eec3310114dae0f5a08f3e2fc945af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599ecdee13a8de95ed6e4b87952bbb3d0
SHA1af2588e456afdca3f955392943b0d10aa44e1009
SHA2567e1f7d38f2acea53e92c6eb214e17b9a112b4fa95344df3d87a23f264e77ef1b
SHA51215a962861cf95553740661f69d6737aa357da674a1e2b623fcfc3b5e129082955e356df4cbe8f4e2899aa20c16079c86af0a574b7a47c30cf632a1950dd1e9a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fddac81a2cc99cc85b896bc66603c13
SHA19610e263181b5bb0294e55cc785f3701a2515470
SHA256898d09eba42f07e6dc4a18e81f3ebb04187a574b19437d0335814c96a9520a0c
SHA5120dce5ce3099c2c97cbc641db3aa223eb2db4f7bac821e7e47efeb0fd1c1b24822659235cd842d20d7a0d9a6a1ae329c4f26a3756fd18ea3ea53ad553712fed94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5177876e367b4667e600561b8c80227ae
SHA1384bb6fbfdfd94d4db47a645866264f2f8d3cc83
SHA256ed83e015d0fea7e7d5587e7f5598fcf2a6e5ec11f8ee25017c1b6b072d512499
SHA512227a4fe30a2a49fdb7309cd9c8ea7434457b07b9956c24beed06877c9a74e06af8b25baa2162bf14db4bfb345794a862ca2886896ee4479f7c3d6d00633bc12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b378b263fe1059e1fd3d560da3dc672e
SHA1546a0aae9e84cc7c1e7fad0c1e01262378fb4a75
SHA256ee0f781fe4c958fa30dca64346769e6126d33eb381cf1fae53cc1647b719db01
SHA512d9d6d58ea14660e360625db94cb0d6b7725a4f5596b0bea876c4abed35a7ad1d1c102b66027808d4397aa0fa4be31d7e658e8cfe138e493d18c283481e6599e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0eccc21f0bfbc977a53438bbc0bacde
SHA1d3280dbf70977580756e0cc6c57ae6653eccf238
SHA256c5128b25a4fb08729cf9aef66d027b2232aef21ddf41a7ba545b9a7510d2b22c
SHA5128f62495f8a25d4eda339bd95abf847efedec5daf0b1f8bb113a0c9067f40ce4e62b2e6cc63965940a72bcec17ffb84eeb8037dee74674a54473c0e98a2f54363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595a8fd30af5201a6fa5c0d8597c62839
SHA140407f535a007b8840550734184ee8d48b0956de
SHA25634f89257cf31fd2aac783e78c718dfb7e282e0f8ae26f334ad23c35f9c64a563
SHA51216d7ac5790698f8b781084c982ef6c3d95536c8ea1b64fea94e7e74e486c4bdb83af0667545094bb205e62a3ca4e18ab1220c7e2ff3c4d0c1460babe15dd2807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c27589f34498197f6de0776c0f8e05f
SHA1e5c1e98c6c46316d4f8f03d041d1ac4722d41e1a
SHA2566e3049edb85d50412ca0c5be66781d6f67065e05f2e3b8310a81a5f2d40ab838
SHA512cb9ebccf02109efaee7f24ff57aa8f6aaaf75a275e84531b23f91e02829e3dde5ebb8cc5628464c6d47383e5a8bbd87dbb56c73c6dac2818d64ac6fa34b1b857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f929231f857d32e998ec513d4258d798
SHA189ae2ca7a6e58e04b048362865c59bbab3a93f2b
SHA25686431727afc821bb149cbbdf5a07fc7d8ff5618aadf13896499569b0cf1179c9
SHA512459ae2166ed8b0dfc82285e53ce5dcd6ad0b12553b480c85dca01582dcf26575bfc6366161276755a5076529acf541a44545163c0b2cffac746200d4d611cc40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5642c5bd009d65f15b78b3747ff180269
SHA16804cfe376b499673b7ac01dece8746249bbc240
SHA2566f3dd766deb00f00dd719dd34b02d37999f8553d2820c921f50148377e51733e
SHA512f0a777a36448561879af0a2518f0b2ad39f8d40578648856f7072c3cf787bc709e4b417e65746521635c26b8ec7214aa10e287536ba140e75682a1a5aed60e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598f884cbda71bde85aaafaa221749427
SHA13b3ca0a32a1bf76190a68288771aee6ccc4d0fdc
SHA256165e13fb2a96a5848aab8fc85d098e944b3860462deb9cc86885dd69d781f077
SHA512afdf1b71854112176d37893724745eafead2595b747becf855d9a9889802d49faaa3ef272b59e3a02ea10e17c65a876b93f4992639c8403a0d756c4197df66a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554e33f45334a9bb2ff6919acb03b8252
SHA103c05ba95e252cf4aca0105efc65b0386d0d87ac
SHA2560e1e330279c965edf60ce7ff6a0d5e0f92b2dc0104a9330dbed6400c7e62fa60
SHA512e368c4edd4a7ac2a1cd2e8fb528bcb48c9c4e17fc1f79ff4032055ffc27233fdf0dc1c384b627e7a9492f670298ec3a70acf75800c89da0d6c291219246c4137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a9eb8cd7123d1c61d3e1eab386e1d5f
SHA118749dfc6ef090d5ff84f75a155c725d87955fd1
SHA25684e17ba9d92d544ba0e2877fc4c530affd05c4d125f344588635d40938427e0a
SHA512524ec71ef0a99677b7dac84b05ffcf7bcdc8ae3890e6b9ed309ac57cb86f503e0786d82db80568aa6697e3ab2e1a3999b1fe76206f81ed45f683fd8c8c2a4586
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06