Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
fca6a81c6fc930020f2bf107071303eb.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fca6a81c6fc930020f2bf107071303eb.html
Resource
win10v2004-20231215-en
General
-
Target
fca6a81c6fc930020f2bf107071303eb.html
-
Size
14KB
-
MD5
fca6a81c6fc930020f2bf107071303eb
-
SHA1
0b936d4809ce66e92f5a4504eb67402c965795ee
-
SHA256
bb672ea812ad13e7273e77d1ac4f138adcf558b5e36cd438b43d4f0f1e5e4d10
-
SHA512
031335713d9102e8bcffa68b1ce1c782f379fe43297068166f2f432d421e2fa63501a29d9e5ccf8cce17c0c3b3f42f558d43c397214fcf2d4cf7cb629463da34
-
SSDEEP
192:+yEioELD/ZmXg8oWllefMJkZQ3wf1vPmlKt6DvE:aioWD/ZmXg8SZQOmlXrE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000d0a77b80ef7a09c62f3425e5e94277cdcab6b887202dcc8af2e4cdd6c2f4fa91000000000e8000000002000020000000e0c39cb58fc20764838a93eaf8bbb6beebe59a3276b254370e1e865acd6c76e8900000003dd2dabf0e4461d78af179d4b0ba31b217e6c2a14d17416a6b69b6668145e65db730d80a747097f654c6669d17ee61e1735d791ba0da0a1efb6a10ad91a596a8aff7bbff2323031ffb4bc604e340d0295cd5bbda1465d7ff06273a552dfa73eba5992cea0f080ae60eef016cdb85f3e83287f216b85ccb1eb8aa4236091204d6590aee11eea97e5c98b71f439c7836aa40000000047f2620fab9f97f269f707b47feba7045c3f17459e3b63f2dd1d3b08687dd5ac56a7ed4454ee8ff10cccf423a7c86082264e45e51a67aab0d893fa23a6df3c3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409569342" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60766d7d4536da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A90BEF41-A238-11EE-93FD-5E688C03EF37} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000001e1c29d04421f6a258d2cdff82389d1b49ccdb2431f2c0cce1c31819ef1029f5000000000e80000000020000200000004c989f73547653589173c50bf145a7d4a0863bd267a90ae0b3ecdb19e46723f0200000009971914718c559fea27117da4388f87ad3f41517991546ca1cc614b29f0685ff40000000bb8f1f13c5944adafe15df6a47cc61629cb620587ad124c86e60dfe57430357bea7bc2c914bec83489edcdf9d149f50d96ab9dc40963b4a5c0458d7f2908b9bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2532 2104 iexplore.exe 16 PID 2104 wrote to memory of 2532 2104 iexplore.exe 16 PID 2104 wrote to memory of 2532 2104 iexplore.exe 16 PID 2104 wrote to memory of 2532 2104 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fca6a81c6fc930020f2bf107071303eb.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58321b3bd8da4b42809a2089e3bd44d5e
SHA188dfd2043593242082384bdaf60b9324c94f5d55
SHA2562a846c70df3f8f99f7268a83b293915e08784a4a52652b7c60113a2479d6bf18
SHA512ff1438f8617647729ace79cad4c51f6ba34b7399fbd29a19cc766085ecbdaa94363fc3f93ce46768969055dda0ff542ab9ebd450cc56390973c38ec861c67cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f64a3062a7d1714cbd10cde9f592189d
SHA1fd48dda2ce65a9325184c9e289175c2b424e9d07
SHA256f11d5618d29282e644fdffb6a2637a55c0bf07ee491e08e71850d379cc8866c4
SHA512549df58c61fb61c7b5afc0c4e8c613705bede55217146423a6c6107c7bef719dd2b42583eaa1b3ddae309145e2f91fc2746d1a5b96b1601e73358c3c6b4565cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd4128a5e8b289784a3dba3a05bde9c5
SHA1f54230264955d3c8a482a9d449a93c3b61a94b65
SHA256f1b6b4c0af38e6afef5f8c3ec9e4fa756113a255e4e444d87b47a8d16e23003f
SHA5128ebeb0c5155bfb3417439594b0685a3911c80009dfa40e1725944c0309b12eb1fb5dee868eb7dd42bd56f293b86d5ec6c7b80fc6a3edd9fa8802230f8b2e465b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6c3c09857d5fb166bd857ecabb9315c
SHA18d6b84408623ee303ca0f74ed3e0d448537bdc33
SHA2560c868a1bce18d0f097718646b3c5d8b426ca031fc006329b874b08401d3968dc
SHA51228f3162a4f8aee76b387d1d798750b16ad815d005eeaf288a6cf2d45eb50ec23166ac33f5e7d870b3f69c50cacdef17c9c95f32ccac315baebd1f8d7a041726d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595d92acfb32ece1487c21e148722dcce
SHA11bbb08d197019f6e3f1e0fcc05dbb6e7d09236fe
SHA25698882e84bdbe0aa0810ea32723b65dfc4cbd767ea06e8b0b9a5e115160186e0f
SHA512b871b82620c2bca29f86621709a75697d81c3a5c63365760049e12716dea5d06f1cad5b1e1b25476584cd24fb6aecb563ddaba93252cdefd0e818764a308280e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a836d1ca63fab6b6d4fbd33e0360de
SHA1d9a084390c90be6627ba8e1c5daf5784e13ffae1
SHA256d1b90402b5949bbbb8bfd9b4e7de7904953159025ecfa2ab2b0a70a70e0e1b94
SHA512d1e35aa36acca70f783ed0d3d003fde2b183c630c4308421f722ebb2fceac177e8ceefc420cf42a495616ceb2176d95c91d7615f1188e655d5531697af9ccf6d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06