Analysis
-
max time kernel
65s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 17:16
Static task
static1
Behavioral task
behavioral1
Sample
fcde127ba9b291ceacc494b147aaefbc.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fcde127ba9b291ceacc494b147aaefbc.html
Resource
win10v2004-20231215-en
General
-
Target
fcde127ba9b291ceacc494b147aaefbc.html
-
Size
1KB
-
MD5
fcde127ba9b291ceacc494b147aaefbc
-
SHA1
15dff33e19109fcebcd63093f6527692f7f4b3bf
-
SHA256
6c4d09d74f4acc978450919dc42cd78977a98684a3b4ab46644af7c0eceb67cd
-
SHA512
2237b4c53362b0432241dc485ace88c20239c7fa9e74262de5bbda210b3fe7a8782f9fb5cad10071b83bf3990f6e0b90875af333daca4a886b1b8d142ee22401
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000a640df4526e2762e270265c40aad378f410db62130f4355532e7d9b10ca0d084000000000e800000000200002000000022db443e3b2abdc8df5987f86f0ed42632eb01fe667e120bab4045ff7c17db392000000072bc5eac9a1f6f17745a6c648985717a428ccad6c13389c435b31c11023f924840000000058cedee3d9fa188cd6be5a5c7f46a19effdd29496002ec41591d2cc5dfb5a1c9325ffc30dda813f706f8d59861196f533c2d9b6127b408e159e32056b5f9e2a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05618a54536da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000b6c33110520876432336023af995f6622df96fd34467e02906f00609da6f66ef000000000e80000000020000200000009d0a8ee466d82e22595396cc272e402da49f1fb1d43ccb8c9e77bffe1c17b916900000003d2f403e2042bba5e3b865f84b37aea42ae79eb036d9acd1a6a8483686b70084d5e67b954b109a1c8b594859c0c822012f52769fc8641bef56b1366586602f2212e10e45577f007deafd64871d838df68264203e89c90ca66ecd8c7b327b45eb4e3763dec34b9fa5d5bc00e84147396603ace22abfc2d42786d4b9f3f00841475737fecca40865e9205e5a94abfd29b340000000a8c20e94aa68ed8fc1c9abcdfed4edc86744d0919caef2f77b77e4e39716fc4d95a63d1038666c51ccb87ee2e2f1c15c45c0d5440cdce25fabd4b0fbbe47d2e3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEAC63A1-A238-11EE-88A2-EEC5CD00071E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2888 3028 iexplore.exe 16 PID 3028 wrote to memory of 2888 3028 iexplore.exe 16 PID 3028 wrote to memory of 2888 3028 iexplore.exe 16 PID 3028 wrote to memory of 2888 3028 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fcde127ba9b291ceacc494b147aaefbc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5268c22dd85a471df82a7f4c8adb83d36
SHA11a9be55048cb6d5b452ed87c453e42f300fa1abc
SHA2567a0d577718f2b966fcd6edaae42676d0d42c3908864eb689d115b4973dbb9103
SHA512449321e513042c75bd3a183695a18470c2afd22b584e5508221ab967576141b5429efd4af4861e067c47ff53381a788d635931e44dafa2b22ce2c824cff40bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a507be11c1b237573c9b0629500eae3
SHA12496cca52b5e648c3b908536478ec5d76711a86b
SHA25648ff610ae0a75e702eb9f87822ab8fe62716e23be0262e28580cb9d2704f1597
SHA5128720372650746551ef7629bb26425571c3fa2cceadb842345e13070ba107532fefa5029b533d2c947c417496a89ef3ea65c564fb47194776aa0eb54a51565113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5df07f5f1b9013ffcf19afdcb9126ae
SHA1762159d00cfc50ce542e55fe1589fb02fd2533c1
SHA256365c8c0dce111cadab45f28abdcf9e883ef52401a4c6f35a5b83f421ab43d643
SHA5123e45a927a55c550b93ef53d0e5a65204648dbbff651c1c52a3b658ad9138da21efe71b2520a8bdb448a4e60ed38a72df8811346ef189092e0c7f32930d616faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c6365ec225176183163db6c9609ce9a
SHA10a7f5863175c5b85f7e5635d156569d0aa70e360
SHA2564f8070ff04635279641c0764520f8bcaf973fd359fea98e1730770b4512dad8b
SHA512092136f8dd718ac58a9a3611dd22df80f77f483e234d07d760a7af4c23e25c8d51aa3e37bc436f7cd01cfb2a8358b0534e277389c98935994ebf23869452d4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a97058ce8551646ad03dadbe06aa9de
SHA1b896426eabe56c6bccb17c0a4b0ba2aa6115273c
SHA256fc6c8e144fec8f177868106e1ca6340dff40c097c243938b6b75bfcd319103a8
SHA51255d8357559c70f780b6838aba28b2e52a9d1689232c17a8db7d5c9fc530443b83cabe5a93e7f5084955658f13b09e755e3f1bcdc2e7e138f9a9ab6857d0aa010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554bf98a7ebb519a8b76df5ffda972843
SHA1de05895224d59dd1d87820239c8581a31b62bfdb
SHA256f0015ad1ffa81463fd58be8de5f323e5efa3cde571125f8db88d77af6c712433
SHA51242a7812db0927ff10c71c7bdfe8dfe96d3f5dea5c7e0a32491feedced8698052cf60ef9cf7a6d0cd2df6a7cbda2bc86b2308dc59823e49f79f9dd23f6b926711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501f333b9a15c86c80db9ebbaaf47090a
SHA121f639e2bde69a1c86d50df58e1db1a00020c883
SHA2565cd5ac2ceb6b55bba70938e9e10f526bb3e6cfe51ce94bd537d6547019f06a9d
SHA5127046615483cb3ac7e36a863351c763581b27186b8b4180fbc00aaca6cc151f3bedd384c979bd869b5a04c2e1ec32ca6cb3ea105a28549b6e0602dcfc96ab5e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c205e7f8669504d44689a67b3389973d
SHA10e2e7ada035971bf5475725d54834971a1b516aa
SHA256b9edf9a7c03cae2ffb6f9e2c8f79acb199fd154592bb96ca87e76a6de9074249
SHA5129331a44a7a62eb539ce78dfafb69bed0c84111da7f38c43cbe27313eccc419c810d327a61f5dab8e3384e8bfbe7f2be2242c92b30aa9ef1f887496f4cdff721d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bd6fa5cbbc39f3cda32ba9889dcfeab
SHA15cdc716ffbc0a60a182af3d249687c9fa7048da2
SHA256ce958503f9597c465247d1204541131ccf0beb9aad55f7a545b44b9b8c41907a
SHA51264507dd02a6f92c359c5743da6a76465f05ad5c98e419eef9f3a81977fd07360df3d45162e4b53750409ccb2df505190731d1c7d7f76d2952cf5132f2951711c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58df1c43f0ee7a9509f2ab25644d15530
SHA12ccf1a7b8051f066fca3251aa8d9cb46d14b335e
SHA256cf6f6e7b621d5f2839cdd7b03db52569d2df3628fe9a9dde715cadb6c6be4da2
SHA512e36c8a9f5c0198a591dc02c458c8a70c056152bab2a578a4ae0770ac682c9275b3c0126f956e5256a83af73991bbd9d5967520c9b0a08b1ecc39f59d4344eb55
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06