Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
eb62b419da2c8661e2154ddfce574120.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
eb62b419da2c8661e2154ddfce574120.html
Resource
win10v2004-20231215-en
General
-
Target
eb62b419da2c8661e2154ddfce574120.html
-
Size
601B
-
MD5
eb62b419da2c8661e2154ddfce574120
-
SHA1
5dfe0f62b978b2c9716423139ad27bd664d56616
-
SHA256
9c0dbe83f1d9b0164808958a29fa10cdb83b189028ccb107afd75439baa299db
-
SHA512
3df1de5247dd70ba14cc7a7f2762f4fa71feceb8dc0bd8776578bee3eacbb3677e87d8428a9ed32e4e75d8903fd1fad4f3c6bae11ecc2866c6b8481340fb9f66
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00B231D1-A222-11EE-AC02-E6629DF8543F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409559617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000cc0680e466ae4a6ca3098d935e58bd0bce43c5ecd62b8e5893f1901dfc755c06000000000e8000000002000020000000ef9c296941f255007a958e494d0303688c408b5498b732932db3796a5b2d35f7200000006a293aedeb91ef106d034b8fd02284cbaa1aba32eecaec94ce708734fef0bea840000000974e5112f1152430f277cad3cee21f2ca4e82052d9a46c682c08a5ec05e5f6440983385ce0f9f9888481ce10c04202037ca8688032118a554b5571f45163e9dd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905f46c52e36da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2536 2008 iexplore.exe 28 PID 2008 wrote to memory of 2536 2008 iexplore.exe 28 PID 2008 wrote to memory of 2536 2008 iexplore.exe 28 PID 2008 wrote to memory of 2536 2008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb62b419da2c8661e2154ddfce574120.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c9afd66705ae069a6fbf70502557b7b
SHA123094e4d22d42e6965e32ba8b242c3e9258507ee
SHA25667b60d1de79d4f29606b417e0513534002dc4c1c7163cc1196b9cedc6f2a090f
SHA51256ebfa617eca44d13bba389d8ea13607a41ec2cce2e08c4d2c24a60a288fd5c1e56ffaa7028eb3c50dce068424ccbeb721ee213b909ca6044122f1fbb3f003e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a468a3fe8c4219a747ccfa9dd7def81
SHA106808c326fe291c27b02d852adc04da255541de2
SHA256ff64325918aa625ed8409c312b9b3de27e9a8c6f64a504236f24bbe36895e6e3
SHA5121caa8e51aa0486ab642f26f6c47c84ebab501ddbe90316ae9dc9d7aa3ddfdaeaaf3bc4f1c66f2049cfa55cc547f5d659d89c209391b95376134a8d5a0c5f35eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d11938c68dec76a898a6ae12cc78a395
SHA1133abfce5738f1b6a785bee3bfa6a0ae52dfa93d
SHA25652426d71908a0a8ccca3cc94d6f1d9420eb0604185501a8e3edac5743e6bb339
SHA51280bb5e3b221f1be3cf8dffc6fb4dee1f902cb16f9e2cb6a54c8573b2f2b5a48fc50e54670c7d4b8a878b17c5764c684bf6743fbc78c904a0b2b472665a1734c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e07e9c7f4ec5b57129858afc6357cff0
SHA1037ca72d4a7dda24969416f2e1df819a76a09d7b
SHA2566e3a636f7a723cc1c7fc4148e497d13de4c747cc74da4692ee7424d00c77fe72
SHA512d735f6a04104a833a0380ef24328795b59a0ecd31dd18406379540a3255f633cb35f09ed148acc4eaa4ae8fed29dc1672205c5bda8531b9523f26cad88eb031b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5665f5ec615fdeae8ccf1016713939c6f
SHA1605d418b6e0e75a651048e020e33b31ec9e9d74b
SHA2563ca6e3c80c844c8a12b54613c0eaf2244c6407d820eb1b263063d05cc832ed60
SHA512a346748bac4005ba90fdd2c325da5789feccb1bb2a8670f9232d0d910e68f8865e1e28858feef992ddec3096c1df2936109fecd1975b44ae4a9abe41127e46ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f4a8d9e2f26477e1643738a91f979c0
SHA1f0c112076930abf6cc84dcf8faf80315a9e5fa3a
SHA2562ce0de141a6a6856ca14ddd2683add71958a9209765571a7cc688b1fd7dab73e
SHA5127fd4273162dbadabe3affa4776731842877adc1dee5db32ca5527fc301fa51cc9dd2b868fbff4282cadfc4c44ae6014235152026a7058d549307bacad6aed2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e641377f352eb5f6a45a8e57704d55f9
SHA1f1f8a56ce7396b210a5982a453f0ca201409f6f0
SHA256dbb207cdb7811d6045089717a0c7e1301f01443f7bad5c828f084751455a7de2
SHA512ff0771c23c18ca01951388570a0259f1d007e067e96213c9b96543237272184538dd15a481e6a45295b9a7bea9507bcbddc069711bc1de1e380452a3e44e37d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f00d03706bba2c580bbba05fd77c6680
SHA18e2dc8e2fac5d7545bbdccb9b710a6a4cd79818c
SHA2564694d57ae4904c87b52f01204fe263c851d5d503cfd5c34696ea9c42d17038ef
SHA51282f24021fd0e3c21698a40ec2c62dc5b6b160e466411413e1e0842d8a76df18ef9e2ef22f5f6d7493a6c90c22fb5171c0a2ba3af2023f064eea7faad3c9a1385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55334d1d89f1bb86d0ab306037063873e
SHA13710b3f6e3ce0ce23e09612612f9c56bfec0b6ca
SHA25678d39452e820ac69861baa51ed6929c867803d632a30e0800e4ab2a15b9e03e5
SHA512eb5a7db30e469a09bf2d65199b7fbc857dbcec282761e83a451e92640458c31cb5e495049af35029fccc03e8c8f8c01d16e8245cbb78b85efff604506585f00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4c2e68d519c9acbe248aafb6f77e868
SHA117b114ee3115d5c1218f69c9e1604f64fa826cac
SHA25604f8c53a135776277637ef8a6c25ae9a4ae186d40008689e72b761f134fb4e72
SHA512dd17a593dd13fd880ccc6113f9f15293eb9734c9fc2321500548d2c1fdd7f859a3363c56916e95a3c73f8a2448e410569aab472966832fb90791365d0173e475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548976ac762f29f5c1efa34d7c62ca4da
SHA1fe2b8167490a3c0d687f963c972143aa4ab82ac2
SHA2565746053efeeeb83f395b925c16d8a8f7f3dd779bb738c39cf6aa0d258f69042d
SHA512fdea68e3993d89fec7b3ff55f4dede03169391261103d6683ec28a46afdcb61a3b0a9a2dbe58c917d2842d2091825dd449a805f8fc5871da7aa980bbb8eef772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550493816c90e24077acbdd128888859e
SHA1f38852ab3b3391967717751bbb7a52644e6062aa
SHA256f165e8eb09b564ca30c6577d8baddff27fb8794287fa921786e7ea0d3a1df2fc
SHA512b37c67170ffd6cb316de6b6d9beedd6906fa6945054a8c7e6f293848a203c17d75f5e2ae843d6ed810885fd8e87f61341f6325d349bd91a01634731599014ba9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06