Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
d69eec6cbfdefe192ad551a3bf74e588.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d69eec6cbfdefe192ad551a3bf74e588.html
Resource
win10v2004-20231222-en
General
-
Target
d69eec6cbfdefe192ad551a3bf74e588.html
-
Size
601B
-
MD5
d69eec6cbfdefe192ad551a3bf74e588
-
SHA1
efb12e8aa40cce798a58baad904c71513f862003
-
SHA256
428417e5a6a51992c055728a07141553f286ebec6353bced0e8d34478ebc2428
-
SHA512
bfe642ce1cb027b3c9ef6c96c60ac2a107491707bffc1b476357070ccace0769440d8c4cb0635f8926b78bfc6f9cfe24d3e391a5464876933eb844ad590feb38
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000002fa526ba6815f2509043d2e230926bfab87d94044ddf2704f66510cf6bd8cc0e000000000e800000000200002000000047dc904b8f83930baa2cada1488d61a58584df12dd0bf743c8c09a0647600532200000009999b2f7c41f517520abe924b339a7556eeec00e6b48abb09fca8048ffd86bbe40000000ffba20134241f47d2924a9ed4bf792e552ae77a5dfaad8c19ec154d8b989d3d97b600db818909065a6cdfdbe9f578b65f80bfba8d1c843d5a8b40e11e57e047c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03578561636da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F92D491-A209-11EE-9B21-FA7D6BB1EAA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409549113" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2668 2660 iexplore.exe 28 PID 2660 wrote to memory of 2668 2660 iexplore.exe 28 PID 2660 wrote to memory of 2668 2660 iexplore.exe 28 PID 2660 wrote to memory of 2668 2660 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d69eec6cbfdefe192ad551a3bf74e588.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b01140e7d40274569673e03059610619
SHA1acaaf5c02ed18516f83d178eaeb3d74124d1a4c4
SHA256765dedb4262fae54da338546ec092eb1be9025bc2bfb93dfead2c6be07e62c57
SHA5127e853ab78f44363146ad0aaa892e52160a25ef7210a60963bc4e37488b8e958241b41bed5402bb96c74f2c1f09fba3d1b5577c0344e10448688f5731d141c438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585d635d29f93c2222438c946e5d0814f
SHA1312a7b05b65d564267cad978fc1aab01d361534b
SHA2561a1484f048882accec08a8ea94ec725d43c209ebb73927a6aa8d1f07703d3972
SHA51292d07b0701e1128059b0021b94b8538f8753ecbf0c16684b138149d4a7b91e07c897e49fd0ac7bf403237a6ff2c9bb4a24e7bdb31fe68d79b2a21668edd7ac71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50da775f93388f3b2312945390778cfe0
SHA1778c6578178d63b8ef3a2b9a6271c35bc9987bf7
SHA256eb894019f4b72a87d9104911b255dc4e19107fa1b885788a66b59d57c4f472f6
SHA51200d81359a776ef167678e32f7d440f4ee233de4b99000d3f02ec129dbcd8d14be2008f9995338f01dc5e5c39402e74e1ceb64c2f96ef14bcf16f1f7c53a17540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e44255872850df1167ad5ed4919b728
SHA15788a1249d8ef19a10fff0068fc8afa7245f19a3
SHA256acb68318aa2317f562385228b785be56b359b0324dc2338855b1e6f74d8e655c
SHA512d7511e7cb5347f2f19024b636bc175718128001ab7928031009ad46740cc691ccdad60b05204c4f2e50ee962f7952b37457f48f1b9868bc191a913372db58fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e4a56a4ed4a1bc629b4ed966f3ed621
SHA1ab5c61cbb2eee34d50d42434ce48b2a8d472cba6
SHA2563fa18e92419ff2f2ce194fae7909a0d6e2699657e3f407d025ea792818e9be99
SHA51206aac3b3ba1666f8a250cc675f53068093914bfc03ecc22662d6fb489781e6282a54f432b48dba6ee8d6c08092e0f609505812fa0b13a9a80338ed04a4227f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d83ec4b23231ccfc3a6af107746c0c9
SHA1a8ad06efcadd5e7097d36779456787b1418fae02
SHA2567cc7d6324b3a405a042e0e631aa48ae2489aa71395ea62e7b9332ee73c712ca1
SHA51210aab728536c44760f958c9b9bb4b83221f4007c8fc774b7c3050ab643cd4a9e6bf16db931f23b67dce056ca4c93e955c57e6808a769db2defa8215541f47111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5408170aa60a01406378a37c78d6bb402
SHA18839c9cc8f6966321eaf66497a8f139cf30c7cb9
SHA25621bb269d948ec4c869ab8a99d5c1a11e85ef95711ac2e3622c3a422793f220c4
SHA512bc08a6f3e343f6275d378733a016d81524dd45b04e897b6d1557b6ed61d424529561531c65bec5846973975986b45a99c3dae88234b6b0d049d2442237be90d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d133a863e43507d982f96de51c29824c
SHA1a35455293bb6acd10ce678bb43a266942736c1dd
SHA256390b630c7f8d240a642ed31a892e814bcc17fcca57a5094763b313cf7d170628
SHA512bc3f69faba04972a4b6e69e4722dfe0335cd6ca8e0d46cfb97b5fa1821a530e5ca78f385c21d64f90f2d42028106c3e315aed1a04670fe4b9c2fd0fd14776764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518bd50f8c7725b8c25013def5da00a93
SHA1f1c9a42de9f9dea14fef1180c0b9c3406c10b150
SHA25637e85d21c8eb2b88b500f429b65a5ac7e8513602f3ec3387df13895923d24431
SHA5127cdb4c2a76f24ace0d0b8fa65b2216000b4f57bcf79437bd08be0dc669b327af154b8ec6e47a53f13218ef0427cb9a84fb767e75273794e9cadfda1702f07617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f3861d460d494c9e4b48baad34e5fa2
SHA18d4117162f8ca3f9050850afbbb85d642a0576e3
SHA256462ac439b7b7e36d2c8d2df5be9f6111744eb179ca53520934c80413862c3f7b
SHA512b61b337245b8e3ce5ef5531416acb87f14f7b921d373e3715f49a77ba50740a677eccc7624aa46a67f2cb065b9339a05085da09ec86e4d617da3abcd68355399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ff553c8b398a4447a83766a89251561
SHA1601f074b376a947d88cefd7737742128f257a5c7
SHA2563d6c2ee0b869b4ec9beaaf02f5211926848caf39c1ee6b3f5c0c3caf324cf89e
SHA5123b2ab229ea46c6256351b2a0a4e93956e2a12886999993e023f15760e1ac4c658be42ba9667daba3cb8b287fe0107e78d407539324caf643286611f1d1752a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5354fc5d463bca749b83cc179d695b9
SHA1937d4d09efb6a94845899d2201ee42c7fbdc59a8
SHA256e8ba136dc558d7052864bce7b0219a5764b2cc7aa5dd3fb83111a81f3c1d1fa2
SHA5121e17e28f16b1400a515397857b47c6c5cdf629867dcc1e567e6e14472feea82b5e549f144652449770c7fe87856fd652ee207dbe5faf5d3adf38a4f0a9257421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574e3b272080796a204995af444821c29
SHA1fbd3b4ad1352fc81fcd0e85b7a2853ef5e69c565
SHA256e7e14ab862dcd1bb349345b30bc022ae092346d579f9369317c9e343a127f5c4
SHA512a3fac0ef8ee99f43ab3009ffe7c11ff72f381cc4b3775f1daae88919739134921866956abe6498861ae3f2453f276cb4f398fb728e4394a19f2982e04bfd78b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5758882c308d5c61e72ed1c500c86d481
SHA10d0cf57545a9aaa42c09406536cadf21fe1318fa
SHA25661a1a9e887446eaf8191f880bae4172fa40477d61defadee41795cc123714b22
SHA512a744dc82ae4e5008fa4771c636297a65c7ce3aa7b42298fdddd32535caf3082077f4088a4b710392864dd29c2b024ef6d881d91ca427dbb5747efe6f9868f1fd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06