Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 17:19
Static task
static1
Behavioral task
behavioral1
Sample
fe9e2413c635c42fdb4613b659be4998.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fe9e2413c635c42fdb4613b659be4998.html
Resource
win10v2004-20231215-en
General
-
Target
fe9e2413c635c42fdb4613b659be4998.html
-
Size
601B
-
MD5
fe9e2413c635c42fdb4613b659be4998
-
SHA1
63c60f507553f57a28de657b270becb73f0a1eac
-
SHA256
1c870f656b490a1a9f1f507b2386c3f1afb9776b66b35a95481fb9797e83ed93
-
SHA512
dedf54eead0d1fcbc9f0f792d73cf761b684e46a4eee22d8348a9111db4f6bddec305b1f569ab272017d6565a1b90189cd68c401402ed874234c908f8a13baf0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409449450" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0293c4c2e35da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83DA13E1-A121-11EE-AD90-F6BE0C79E4FA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000ced5f57d34efb5d73a485650d5b24633371973df2ebbf4b8a2395edf7e7a28a6000000000e80000000020000200000004d13d70ece17e2525128a04c35197dcc38a6677b9c2e0975f3732d26430ad3d0200000006e89f4e592f8fd4505c2f298ea0c94a9331c403a96510d1cb9931937e67f19db400000005f4eff6085c43fc8d736b678546bbbb43dd96dd3b0f2aeefb7e2e1581f13fc604817f0f08bf28c4f58f67b2a7676c1d98610f25847d56a60206298a646400655 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2164 2216 iexplore.exe 28 PID 2216 wrote to memory of 2164 2216 iexplore.exe 28 PID 2216 wrote to memory of 2164 2216 iexplore.exe 28 PID 2216 wrote to memory of 2164 2216 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe9e2413c635c42fdb4613b659be4998.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e6fe48b6f96380e89d9074b94b6fb44
SHA1ce7b8d36b6dca8b2c13e82eb923288900ced5015
SHA2562f87dee1840e728e4a9c265f37b0d3ef76087ef6b6432cfabc17c13da8e66997
SHA512bbf9e1cd7bd19574f2dd07505cac99f46958ad8bd3026c324e3e60974c1ca79ef8f0b4f690742dc0d09ba636a84bab6c60d1926c82bf784948cbaca3910d7ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fef92e524526a05372f8545e11dcf5a
SHA1e922cb878d3c07f3b3d6733f692059f4cc748ab4
SHA256d839a86aaf3d8a5df065add30bf87281bd2d9de76cead34e54a3dfc997ac6b99
SHA5127f7ced47e255e0771a7bdc19f58f265bc880e0d956abb1832b7c04fbc0388fd150d82b66cedea7fb634492a7afbade5191eec61434b6403f78373254dc79025a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54872022428bac4b717d21df761707311
SHA1f3b6fdc15278f38c3e52e4e9b6b5281427106805
SHA256bc56edfda56ccbd717b4b35c9277e6f473bc6b85ec549b4fc780550f661841bc
SHA5123a67754d407584b5be9ea9c6e6e6c228d6f529039e50c16853fcca6b4fd6f41041ef8e07a8f1f71f7c736f88f941bafaa27a15d29fb1525ea550267b76eaa144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7007b31cd1ace2e504587b0e9812168
SHA173125b9db79bd9afc82ab4d241e75b417c5366f4
SHA256325d0eff0a31943adfac07c7a8a6d629db1cdb19c1f3e4a0e91d6141a3e06724
SHA5129309e082c24b259a8371f393ac917ed6af75f13b98bde65d15475a03e058747b8d6823f6f9b72bafbb776580c2e7e5a7d3c88ecf3e9f1b8808b341d9d8699a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c850dea90c980744bda48388200ca8cc
SHA128e9181d09c75b6afbd9be74ceea58103903dc5e
SHA2562c170103f040997bae0c8c36d97f813ba14d2d8b866cfc625a89d7a3756752d8
SHA512434141f66d3ce32bec9f7271cb792a5fa22ce1925d932902483fece3b3b4c5e6e2e6a33b752a1b33861b8d4486a6070d9a2fb8c7b29475806122e773aa19e035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e74eee20ed1712aa578ca1a852752251
SHA155bedf5945da7984b1d614f9e9c54d41a5486005
SHA256e51b9afe30e99f93b78e6ceb4862d65b3810aa85a4a475740598ef4248eabdf3
SHA512f414ec16d300aef706ce32496b9da29d4bae754dd91a9b803c6ecf647e715ad5fa2065e162b91a9cfffa98b17f033f5fe1d9b55a4dad90162a3cbb013ceb7b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ad77d10dc71bdde8d9ccb7f8769d790
SHA1a49b2981221d4134c27143c814aad94238a8e8b7
SHA256fd5d3550a0ffa16aa155e7b539bd11161b8050f724410b35fe9ccbb219f23a50
SHA5120bb45e6abf9b5d8837f034add9c349a96c9390226389d9cb1d68149abf6618878987311118a7e5a878a29518284f52a2da6a4bceba671ab420f0ca9b320f8c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e70e319153e16e21dc25ae4233b7c58
SHA17d12f853ad4707532874abe9f3a8d1374476a301
SHA256f4b1e33eac7c270184e58da57eeadbf6be4e995bbc7d485c5f5d7c7201b9e69c
SHA512eef4152f410d0fffc489a3853750652ea0f0f1a42367c0d9123bbd1c52e0a624c7d4bf1a9eb3900e81f4ed3d4dc1318ac7015375ab775fa627d98b6b33f063ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b54d54fab6007452e934bc0d33280a27
SHA17335c33b66a54e97cbb9b3523cbe7997057ea02c
SHA256fbf796815b41515223aac19d634aa22b0df4ba80448af3b9d52f9017f01baec1
SHA51241b658839200f8cec568720b826335f86ec672a37e920d4373e38d21f5842b1730dd07fc81b91b77cb0c3b9f07b70c26d99d59a54c7aa79ab926c04e78a2dc84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b9a4211b801bdf05ccb493a5d8266e0
SHA10f90a6c8f68f1f488e10800ae7f0cbbbfb01d1ba
SHA256d9102dd82c1a11ccfc027c3c558d748246a349bc11709191becd7649c0453ee7
SHA51285b914572dd7f5316f84d7cfbd7baf7ba5866fbbadea6471d2edc3fc7e00ea59503755757c201c20774b26329932a16443953ea19e137e3cc52bbe59ed2321fa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06