Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
ca2563408e4f1776369e942538387382.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ca2563408e4f1776369e942538387382.html
Resource
win10v2004-20231215-en
General
-
Target
ca2563408e4f1776369e942538387382.html
-
Size
4KB
-
MD5
ca2563408e4f1776369e942538387382
-
SHA1
903f8e50b87f1648dda8d207ba0d1b71fb4972ef
-
SHA256
5a4dbb17d067b11a48afd7086090b1d164db5c7b6839414eccceb66556739855
-
SHA512
ca5aee2f4203bd9972b4f9fb6c8c0243e735da18fe6a54217f461a2f054d0b059fd4892411accb206ccd0ba5998f18eee4df68cc9893e3c564fbe23d7fc6eae4
-
SSDEEP
96:rf9seakGiwLsvfpFFOxUEAvBUqsOeN0Eg9jag0MwU:rf9FaL7LQFIaDvBRlVEg9+g0MwU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409541659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000006499078d7f5bddb486f0e2c26f196ca3a0f37885b3d850aa11df07b33a7d83e0000000000e800000000200002000000028ed989e8936d802b1e3ae9c177b789145089f027a2df40ec49f4c495a3758d420000000f8ec115faee137c2fecd83169cfbcbabdf07f29ab2380c3fe314be21803332ab40000000fc035cedd1efb52e08265f38cf26b140b3cbea22f590d99654ce38f51a644c8a27d16e2e3f5fa8d4a9d5d31c9e4db4ceaf24ad7645ad7efee5ceb2c805631e9f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9023b8090536da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{354FAF01-A1F8-11EE-A5DE-CE253106968E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1032 iexplore.exe 1032 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2324 1032 iexplore.exe 17 PID 1032 wrote to memory of 2324 1032 iexplore.exe 17 PID 1032 wrote to memory of 2324 1032 iexplore.exe 17 PID 1032 wrote to memory of 2324 1032 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ca2563408e4f1776369e942538387382.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7954b2627f375a5ce04ab651234390c
SHA1e8965ec26c123b039521a458a985fa3c43e1128f
SHA256f6dcae246523e75c9f41598475076c4c3a6d8f8bb9db9788aefac61c5478ee78
SHA512ec5113faca1bb29571f0d90c09ac5c67e845e311ef2c02ac1c709ba9746a1313063e611955fef47e4f2f5351670792be0e99af89319cab26839c1bc976907d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c945d2ea57c40d89a237003696fcd32
SHA1d755ee1abbe645bfbd84950f6a13bc69ad136d8f
SHA256e5d2066f71e1d59be4fd660bba5776e7c1e141715948f2cef461f578711f6989
SHA512d18e409933322bf2383aa5e457c620f827b7d07d437587b6a8d96fbf38b9166e3905b414776a235ce9cbfe109a69a3a25faa71e2e800838ecf54296149bdf8c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb9ba77d3d07fc029f67ab4e581bea6f
SHA195e3db0368b02568283c1fdbed05989dcca94fe8
SHA256e07a61163feb223019ddb5a4d807af334be9362813bfcf6216ad7a3babc17de3
SHA51230abe86610c8a34068c04c0b298401bac411d2335b5552e49306a6911679984b274a869bc8b63a0c76ba3a468b4aebb73b38a4c2222972d39114c07988846140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556ba581a494a93de1b7ab1c6ea402bff
SHA14b814122c0073449c6104796401302e19747d869
SHA256627cc242a91e0fd4dc543d441f94f967088eb04c7224438bfd9668a01901cfa4
SHA51234f4172861a5976ed0182b56752e1024f692117b73575266d208947be8cc2e8c1ed6c9641deddfa5afda2e0d5a10da450617c2aab5d259b70f27c76a9c1e423d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587191ebd4e5734eac1a62d54cb816349
SHA1283c5cf9674e2e802a94c55c9f473fb0c78fe78f
SHA2561bd0eb3cd19fe3324e67baa645e8e7811789d6fc07f834d265352638a3c4269d
SHA51241bce974dd28aec19b7833b0b1970755732deb8af1626c66c229aa46631f63c6df55b7296fa358f8d12b96b914e40f26a45db70719c36af38b5e33c345293022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5466a4a77344664337c283718944ba5c5
SHA10a3661515a89b95b1edfac6ba6ca73dba62902fe
SHA256031f62e8b965a65fa20909f442eda7404142b7f64d54b31a08625f3fe4d7a4ef
SHA512f53ac5d9ca3f5927f2de67db32c2fb8940c4bd244dac296206c8be1f58e560351d0f80f50426648bd7828fef93f43b6e0e6e67cdee0e8c317fb27b9ddf797cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506ae75aa5cdaeee5285ffcebbe4acbbe
SHA15052e6023616942749e379d868bda109fe4ab38c
SHA256eae24db8d365788c447f60176ea7feb87795ba30ee348b2e0c2901eb57df30f2
SHA5122f54d269860a7cc4aa87d048671cbea44c31498de43fd198fc7041660733e44c38b1eb1542cc958231cd12f5288f89f569d4a6bed801e37877a45818ba9c6b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f81254eaf5a8c26407d0167de36d3818
SHA16d825d5aacbc881239dd9f2c836bf8513b26c162
SHA25658ee6f7624bbc6a0181d051732441f4c4b8c29a5869e910737a05be4a320d0c4
SHA51212702ba11ab4e987bbe1dd2478eb96f5d09b0e8387ec1a4345dba4161bbaae918a1a549c19e6bfc2a918712318d56490fca88097045553a7d3f5376204e52335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0e82ea4e2e14eb39dd01d89f5655428
SHA19be390793263b3b59f762b9fb2cf9be4f8380753
SHA256c0e88369e6d6ac3ccb8f55fc08214e980b76c9e4ea76ffb92dafb4a2d6b2c3c1
SHA5122dc8f505681086a29bad4779e38abb9196049a5cd25401f29b187f5b6a51ccf90d14a04c323c928fdb2c8d5060af536e204f0b60321682bff63f6a4869c6d492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5251b17168035e6a3cf4c18682ffec753
SHA14ef8cfb851b2d2aa5f629c5cb6d1638b2a665c8e
SHA2565d3117d18278ce87d74c78dbf2687be026866be119a0f195f30d75b14750f027
SHA51215ed139573a1f603d730b7fe0dd79b330502f8cf28fb19c44a8ceb815d01cb4c1f599f5723bdd2c4d0fbb9b6a7a490507b909ae99c3d7916438d5430d6819f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e326fd7a8e0c92430ba24a48944092d
SHA125d5f941bbe9f8d51f78a4415f246973e2898048
SHA256372de7632f78d9462f6a34c01386e014cecc1cee31c83eb9cfb17ab62738de65
SHA512ce87da153aa36cdda2c97e40f15a4ce3a1c4a2875beed71a800476b1cadbb72d80b617e206a218541dee9da2a2d0195d938ee3cdd45b68e7ba2f056199d0e07a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556214d4aece3e8a5ebc957d23c49fe10
SHA1ee52636df22b5633c4893aa36c51206ccfed962a
SHA256065832ba9f6f3a62bfc6e1f8811b8749a772ec18797a431490ca3f9185477b52
SHA5124ede1385e7ea372403485cf174b43bc0817114a7e20cd196a0f364d29747fed5a8de602fe488beac16eaf4df4acb5b8af15b2a1972cbf716e03e05fdac3e78ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6d5608d25fab45dd06403491a2140cf
SHA1aa3b26c17b5b261f89eade56b06820fe4b43e9f5
SHA256945196efe7bcac0cbdfe93c05e311af84588b4a3da6e54358a80231e2381dd69
SHA51272e986bcc79ffb1b61c560d8756d7ef9cb9be5f501b0171ae2afaadf0834a16e73b120cd93ea5bddd8acb4dd2e41012449cc87718e1a3309275303d89a455142
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
27KB
MD51c1e6d4a9525a7254b9e0d2fb1a1f706
SHA1542d6be1475b899c2846c99d18907882ab3d9104
SHA256871e35041e34b0437fe74a0db61743ba35b5ec1c09bede7ecb50d8ff9dc09256
SHA512a8c5f2e1169e16f3ed4e3a61463ae369479de5707fbe91207544c91c04be35b3cf5dd00b59e4d9fef7d1fb6cc7206c263cb8e1df0b4702a5047fd21e9486dd55