Analysis
-
max time kernel
139s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
fc156c2ca869ef3242cb362aa8779849.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fc156c2ca869ef3242cb362aa8779849.html
Resource
win10v2004-20231215-en
General
-
Target
fc156c2ca869ef3242cb362aa8779849.html
-
Size
1KB
-
MD5
fc156c2ca869ef3242cb362aa8779849
-
SHA1
a61eafcec9a29a4eb4e607dee8a8453485e5c470
-
SHA256
05afd5654be3fad5b6ee0043eea1b9050e2e1ee27d17ad725067c2f6669dac88
-
SHA512
dc7a2c1fe21beef0128557f04736dfd2c58de7d65ab1c5aab89ffa55497788c63e5dc981ad8bd6e62b0d6c9eb479c440f6a67b496d04a415df366db3f9855adb
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d78000000000200000000001066000000010000200000006c093a05d964297dfcb1d83903ad2bc2499290d51b66e50a0c2f991604893322000000000e8000000002000020000000102d5e33575379448711ae1426866673e89afdafb5e599c430882d9d8c67899920000000088c05c39c668da9e296088eb2c8e5aaa37f2b704ddd4ac7190ed4b749c9f15f40000000d8297e66fdd3550485428cc361c51a9516047075af83dddc8b623202e74eb76cf527c1b8a892b13dcedbabbc4e62fcbeb2ec4181bddc7f656c9bc34ae1d30475 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409569065" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{018E37F1-A238-11EE-8456-F62A48C4CCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10fbc8c54436da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 1244 IEXPLORE.EXE 1244 IEXPLORE.EXE 1244 IEXPLORE.EXE 1244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1244 1700 iexplore.exe 28 PID 1700 wrote to memory of 1244 1700 iexplore.exe 28 PID 1700 wrote to memory of 1244 1700 iexplore.exe 28 PID 1700 wrote to memory of 1244 1700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc156c2ca869ef3242cb362aa8779849.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e495e1b753eb8181144f2412753d9e64
SHA11e65fdfe1eecbc536d4d56210d7906ea06e339e0
SHA2567af54b1ef9ba8659ed241da297e34c439401eb0ce6d300059051102801ef23af
SHA5129245ab09e9b844c930c2aa86ad94c1c279f67f4741f750c4b26edde52032d65e7a4b3ea0f1a00fcc875c1ec7c86d79369237cd8dcc4ff13f18c73098b9c89624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD511eb6513b09fcd33fe83658dd1d2239f
SHA1aacfb355096b943978d8ee8000ac59291e853e94
SHA256bfbf417d053ef01243f00fe8c1e024a780027a75ceb1db61a62c5503ab3ce24e
SHA512e98f8ad1c0f183521d5473cef09f43f67739851d94fda5d2d63c44c86a52ae7d1f60f773c2534b21ff57203c73952070bb128edcbcd6ceae70458e15a992f3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59dd300b854f738e22fe6954aaedee2f8
SHA1b7aeb0dccff318573a98419b9360ee840bd8105e
SHA2563672b7e01cd9d7d71927af458c3e3b8e1c7d5393a8155996c5dbdbb7d69a7143
SHA5123686847e63d498e8625e42cf47f5fadf29fa832acc817aad4080c72b653bd150551529f7d933bb06a9f8f244911eb51c0e3a7c68b65581c04b7823b84fe66ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50335b35bdbbfbcdbd4a2b559dee977ac
SHA1169792a3e61d88b97e2f21f84fd56237c8d54d56
SHA256a2368c086813e3d5d04a4d798af303b0a2fd5f8433e66eecf599310d83ba30ac
SHA51299d6a8375382e847a4da736244242c59de370074b9f06824134e3f6ac2f0edac17a88ecaf81bb63a297f06fc8f157d54821380654df79e72eab573ef71dc7d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573762ca65c8755255e0aa98bfd90eaf9
SHA1cd832d117b5cfcfb4b2ba3ba892a9f980175b3a6
SHA256ede7795f87073c329c1c2e85bb2c5145b797f1ebba525896e8e4b4b2c7e5076e
SHA512876c85dfdfff4da4adaa4d49392f6a568b066910cf65d561b9395d880eee7733906570571233e5ce620f435260e902e10a07fc43da638f33c0b5ace9cb59fd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD588fc65c479abfdcee9894031f79bbc35
SHA13af60120851016036be339038c91152383d9f4a4
SHA25671bb8746ac38502b02520e01c4e00453da7c8c43ff9e905d80eb4c399d8fd0cc
SHA5121bb2adb28c9e218697ac48fa7a588d00fba8bbb6c4a9312e849528b2010864952b8003e707d720a78886ae6ea671ee5a0468fc465973c70dec846dccddcbbc9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5325f64f25c6c11bfb75e455e6fe04dfc
SHA1386a3426824b442db02357fd874478719718d92e
SHA2560cf0d747b985a48555d93276c04a02a18167bc49da925fb5add7befa95fe4dd5
SHA5126f1def6419e00e83eda8d8295c6423e019ce3c4bfc7fadff7c80c5aa56f5020cbfa2b1fa1135edb3c7495f1f986e63a1fdc47a45b7bdadd13ec831eb414ef23f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
92KB
MD571e4ce8b3a1b89f335a6936bbdafce4c
SHA16e0d450eb5f316a9924b3e58445b26bfb727001e
SHA256a5edfae1527d0c8d9fe5e7a2c5c21b671e61f9981f3bcf9e8cc9f9bb9f3b44c5
SHA512b80af88699330e1ff01e409daabdedeef350fe7d192724dfa8622afa71e132076144175f6e097f8136f1bba44c7cb30cfdd0414dbe4e0a4712b3bad7b70aeff7