Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 17:18
Static task
static1
Behavioral task
behavioral1
Sample
fe2c5de1f139aaae62b04faec01d8808.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fe2c5de1f139aaae62b04faec01d8808.html
Resource
win10v2004-20231215-en
General
-
Target
fe2c5de1f139aaae62b04faec01d8808.html
-
Size
1KB
-
MD5
fe2c5de1f139aaae62b04faec01d8808
-
SHA1
435568f0b135dfeb457df2c6be28978ee355f1c7
-
SHA256
a6d99606560578d45b8f50806fc77b53885195786e7cfa93d1f5ef7a1a126495
-
SHA512
e159f65b6934bda4391089efebe2c98663893191caa25a8a4bf103d54945830f0f1bd8c2cc01aa6385da19d439e27b446a1bb3936c9d1512d8530e69f67ea5a2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B375C01-A121-11EE-8CE9-D2016227024C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000003bba3992fa55595ea5f7042a47b31e2b2807ec15c3b69a003c128f2b9d39b77c000000000e8000000002000020000000b0ef28eccd02b1bbe2aac298e05b20045cbc27a0b7f9fea93ddd82acb129ac81200000004ebff32128869bd7222b6a7a26a722dfb73b767b6c8bc1c02dada51ec16808d940000000052e84737dfbb92eb3b30ae638c9ba2092811d20d028f675ee44a7b0abb8396b0f03a67fb28e8d000c42d3137d6c9cb615c847e4215ace4b35d8681c93a49719 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e02101132e35da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409449354" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 700 iexplore.exe 700 iexplore.exe 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 700 wrote to memory of 1092 700 iexplore.exe 18 PID 700 wrote to memory of 1092 700 iexplore.exe 18 PID 700 wrote to memory of 1092 700 iexplore.exe 18 PID 700 wrote to memory of 1092 700 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe2c5de1f139aaae62b04faec01d8808.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5221e5bc9f027ba61caa4faf29f4afd9c
SHA1a527f8349fd1428ab2de5d64cf67e88316f6a858
SHA256f8588d1a2d88cfa533347df166408a81bbc8df34e22e6d48fc13f057a15928f1
SHA512892534a1ff081a15d0fae17b5e641471e3f6ac024af0e7617aaf6304a065425a5d605cbfefc51f03c45d8d40291dbe11029496635af20ad6cc8ec5b437371d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5824269a5f597e36679893963b5ff880b
SHA14e910efccb57ee782af9fc7214bc9fd187005f93
SHA25639a1257f2ad4614b63cf00f1f0516ee1c7ad479dd9cec81cb59e3a70bc6fb619
SHA512f7da8d74536196c22f9e2f190e5d06bb1645fa796baaec930a9e505d87c3b6293174e871f63860a7a4ed260b7e5df3c39c87cc3f2533a74eef955ea7f086c6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5866cd4f39139bf4ade13e535bbb0b709
SHA142635bec5dbc544aa9a7cda05dfbc2c30df9f153
SHA2560546328754c266b7cf0aa0276acac4ad2fa6c066bb69a7eb0878dc22dea439c8
SHA512a48a972ab0827dcdec486f646ba87d60a3699f535492700cefbde05cd163aed8e09604e90a57b6093c458f994dad435351c06133ec80006e33253f4a07d3819b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523a323dedb98d0e1c91aa1a52228fc26
SHA16537d0f2cbd0699161a54eea9c6f10299d574037
SHA2561541f1c52987baac0bd5dd368b6346feda4620008209ef710c0ff0dce4bf13cd
SHA5125ad5a6dfd5b9bd7c20be4f766576cad0f21899b540fa209e02875d7fd17e999b1b039167ba086694873a8d1b810dcec874a3467cd263766f36a64febd6daa3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d434b7dc3261263a87d62c81130bfd2e
SHA116e9e6955f7ac84a5affe32b53f86a01852b81d6
SHA256a65055fd89dbcadd504bcaac02def37a6cb6458a5e76ae9a82d030ff25ed5395
SHA5121077940df29df385192d06ff4064d996ece8f6a9e8c996e79fba143a67e78dbfd49ba6eac497b1f7d1ee59e3379875eced248574b044d172cd255b3c5a5edd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be700d920b2fc24382313cc01e0e267f
SHA1cf02295507296db95d1e8562f1dc873fe72380c3
SHA256f9a6b291ae1aa1d7da220448655ce1a485fd7b490708a9028ae0e3c3b39be8b4
SHA5120e445a99f8241930013854bf99119336df4149309ac02988f05794c94070d3b52e5ab7a994db91869ce983e422f80e1ea8312cb1ed7f3dd6d3493658ffce60ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5824fc60e506b5e13ebeb63e142ef7663
SHA154686e74b9539c728722ca4cfb3f48ac8b2078b0
SHA256a6ea29caa35ca747edc632d542476d9f10cd572aaaf88e699862bd6d0295fe29
SHA5124088ba6248de5a66a4f4b07153eac9d7a8c65ab5df98f7170051a3e1afc857b34a805dd148ed66e4f88a8be0760564ee013efd4eaba4e64d5be2e9f7abd10b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55057367e70ff41cfc2750a8372becdb9
SHA1550d40858f76675ce9282b02c25c20dbe3c6b6cd
SHA25697755948479a9efd46e50790cbc74dcc5cf7d3ee976b399d897714b3fe0dcbd8
SHA512c540511ceadfb8f8cd01f4839ef398f82eb500f079f1d9099d02a3f3addd711ce7515386a8baf10013d7f496a29395b31420cc36fa65b5d467e871979ca2a0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5165384d452c9b6667e22969bf0c1bc9a
SHA10513808981dce0ab58689dfba0bfa9ef0fb9e363
SHA256ccb86432f0e1e6f3062bd12f913e52b9c91ec1c406d0aff07f6a80fd4e922e99
SHA512356426832b63884543775679fc9ecbeef36c9b12dc6d30907bf985262e0eecbf35a9f55438428030a54cf99624f3750549bae3b399bdfce1482d3c276c7f58fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c589f081089c0063674816ac6765f0f
SHA193c73a818b4f03a1635a6b77a844d0878e043dae
SHA256e3db59f94211018f8346b325c9b31e83f81799b0ff97382fd4da85f726638cb7
SHA5125a584fbedaba0ba7bccc8941dd3d85e5c17cc1e86cf0afbe7b81f5282c54e754f09d100bd7e3eb8ffbfa5f2cd06b0367e926402745ba69319d11d41c7de00407
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06