Analysis
-
max time kernel
140s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 22:08
Static task
static1
Behavioral task
behavioral1
Sample
14a18265377442c4ad6c1c65bae903cf.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14a18265377442c4ad6c1c65bae903cf.html
Resource
win10v2004-20231215-en
General
-
Target
14a18265377442c4ad6c1c65bae903cf.html
-
Size
16KB
-
MD5
14a18265377442c4ad6c1c65bae903cf
-
SHA1
5f2b1b88b50f37e3ec2f00e714c4ef65928681f9
-
SHA256
0074b0d4225e823f10e36869d01b816e2c4903a2d6d8e0974b560771480594bc
-
SHA512
36980d35dbadaa2aaf38250773aa17a1f14cd955ede0b3ea106b73513302e89d6ebb01dc1c7763ad49cf0d29400fd0ea31036a9f28f04be938db2cc34d437793
-
SSDEEP
384:4drqMi0VuZZuDXRU34ahVX8lIIWTwOTt392Ri0LuZS2oV:CM02Am4ahVvd0Eo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C84F831-A36A-11EE-9673-F6BE0C79E4FA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000a5891a6c5c59313b362c9e8c8c95cc5df647907f43935a6758fa3e8341d7e517000000000e800000000200002000000066cfb2e31545537ddaef5d175ff185b46809c10b4d5b88b24bc4add22e1ebb1f20000000a030f8945ccfcf712fe3692812c2348e56b17f84b6000989af62e24c0da1fa0b40000000ac2f5c108e43a4e8aad4bfac0cfb092c05107b8094e942653da256fd05825c7798605b83c3efc3fe23568ae8d1f541f6fbc5fe96bd5babcd6ab01d0b79096cef iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409700697" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707457527737da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2808 iexplore.exe 2808 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2672 2808 iexplore.exe 28 PID 2808 wrote to memory of 2672 2808 iexplore.exe 28 PID 2808 wrote to memory of 2672 2808 iexplore.exe 28 PID 2808 wrote to memory of 2672 2808 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14a18265377442c4ad6c1c65bae903cf.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5043f5c4362120c7d135581a3c05ae4d1
SHA1d82735a9b4f732ef33f40b215856edf0d8b7f712
SHA256cbd5efddc531c588b69b607e562fc03a5cef2f4ecd0bac617010098080234af6
SHA5125273209c4097e1d29a17ae61fda0f7b25f6b19e60e991f888c8dc46c870c3c4871addbd5838f9c53bcec6ea99c317f7d083e281135c015324e898ea543657fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5005671d28cd35a51f479ccd5192b1281
SHA12f5d23d2f0c57331901d147f8d33c188bda3f0db
SHA256d6a1b96f856ac2393980ef999a4bb0f3f6d59bca11b167a2380d82ed0ca5023c
SHA512a38e4090d99def72046a88f0c111aece7df669e33d724badbdbfacb0a265d09f1e2847884244d1208e45e4e34d249c49475896018e318c0aa268a565382f4197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578c7095f1e2b2cd35653e1e1e13f1859
SHA14a18296df63c13659771b4181f0a84dc7b6f0936
SHA256e02356876bfe6198373ed244f13c211a0967364dfd61a3d79a675ed7b15045c0
SHA512a3737399aa05d471079c8e276c48f6036e51426ffa58492c620fc407489e62940c2a6916a170ce8f79d3f57020094c331d2a0bc53ca23b3a6e5fcbc68b33e63f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c99484ba0f11c3e8eb6f0aa09cbc8ccf
SHA1cf035567c98c4d7c0d0d156803ff5cd2be6752d1
SHA25617829ad9ab18bd3de2ea2bc6d504a8060bccb2f1a1861fec4fa107b9aaf3248e
SHA5125582f474133ed0a6f31c1957d8548345f7d59109567ca74bb91479bd6f7ec58084668b235e0de7b86e6d52468b8c37643f09fdbe715e6dbb2de2b86ec6c3bd42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554d03105e3bde0a4928fe2a3c10109ae
SHA1d20b1eff7bbafdcdb653cb1ed1a20b59e0652b94
SHA256cd583ee19b8cc204f845f5361812d59d7b59ce807c0e63b0459f27b1bb7a3c9e
SHA5125ec266927e23429cf9b9215ad084916bea395c5f52cf285dc87512f1d3d3c3c629caea57c8a6ebead7101d2a2769889be0d3a8305f40cc5edcd3f297028722eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598358011dd8a3cda6dbcc9290a939996
SHA1aaf4a5d6b7914475f98cdb41614673128ae7f5e0
SHA2565a25caeac74fa8d0b03c60881cdfb346d467d6507a07535e4276348a316ddd85
SHA512f786ebdd70dbb46f49db38f7fce699fc2f141cce5ecd28580f5c1d8e938e63456a7dfd9db39b0ba6aebf683ea41e411dd237cd932241e396a14973a0689ef53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd2508a990d1f7f8039879952b266ab3
SHA1433b447b81249f02852866409fc2439be5de37c5
SHA2569d76eb61cd74256db71372f821346e90d1b7d181a67e29b8961ff6c1a5c8bad1
SHA512b1ee2c44d16c58cd2c69914df7b0f168f4d5f2761b838013d04a725689398c3e00258d2acf0a90b0606405e21e8983f539fc842edb91580d425f0e1a6cd357c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e10337298a12433d1d20584f2887a417
SHA16ad558811c72f77c8e6b7b650ec149876a7318d6
SHA256d71f5a420d180182f4ceb74d457136c41d081328833f9205e5192e30761301b3
SHA512911c34152f64c48121c2049c407ecd5ea3216abb7232dc6b771ea9b7ea3a07304433f68d7898165c7afec23fed5acc4f8c877f2d142c744b59a609887d959be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9adf7231080cdf6c80d8dbacfb992be
SHA1ef6df24cdbc8bb658967660d2a439d97f27cf7c2
SHA25608a6b62c88ad32c746eb367971adf55d204cc6839adcd11962532492a4f7c1c8
SHA51252c126353ad84080acd5f16acc7a417228bcd2a0e1952e08ac86307519bd31b9bcb1908b802d5e6a18649b75963dee7a4dbdf510933dfa1953b8abb7c12d613a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570ded997d057cfce0d1437efe66f99f8
SHA1ef8e8e28ddcd440b921fb8fda83ff42086f35c2a
SHA25679afe06e9e14b4a86f4b648c93814e7974f9333fff03a298af55ac89fd0c207c
SHA5126675c4d7d531dc9c679a1681d92e642bfa4d9918b3c6284a3d57fc70ac1f42458465f368ad54cd2ec91b23ebd9e83ff78306c8e8058e91f43b6c2d33435200ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b7a9d61e264d9427dbe21a776a2444f
SHA1a6fd8fa2bbebfc2c4de429649c6dc45138fafb9c
SHA256823350badd1b4e28eeb9df8e12ab5ec9e1474082e35d0c4c2ce8131489ff11f5
SHA51287e72eca258999a5da53cb8387a99984ff5e43963c99dfd1fce79f1fa0546c3727bb885303687a82a8836db819689dc55bf0a99118becf4df4c7fd4508617f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5910dac427b3a4a9a0de62dced9a0ecfd
SHA15a5aa2c58e664b0f869831037b3b8b69c7eaa117
SHA2562829dc19a6303d698888f104c36f12500bdec021f522755363441744483fb61b
SHA512729832bb566cd90bc502bdb2e6753b1cbf6476e073b68c6124f63e115aa1af993568399a4c4de2663218004fe3f8a412df7ddce34ae3e82673abab0d8f9e4c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c6b86a7c377a6f016a8364e55dc2546
SHA16c345ed3e125fd029f7563b8a80885bc8b53b412
SHA2560b0637836b2f54a8c52de6c4b37795566cba5aa7f04e82b86db03fc3cf53b6a4
SHA51276af523365d51ba961ca896b4c93d447b18e1fee342040139a026cb0bbb813d86c834993485950be5f04a4c9db20248dd403076724cc54bc18e6ef1ed33d6f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b327c760484ff76a3badd32e20cd138a
SHA1e315ac1d2d308ff73a08c16477ac17af072414ed
SHA256e5edc63092ebcba2e66609b7fd983423d933d345bbecef40dfe75724e13bf7e9
SHA5124990da38cb56e2ea0f5d9199080964e76b3ee83baeb840b2ea805de6026ba7b08d3dcf4920406e36f64aa596bc101749d65ecbe2950b8e36013ac80758e87165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5443377ee7a19a03c8f7a11a3bc184f8b
SHA112b80a859439e9fb46109558e5b9b18dc037d0d3
SHA2562cf5cf9eb0b3b5b7e6d53bf6f2d90c8f6e39a8c2961842504b72a8173f45d4d5
SHA512e83ddf1b519c8ddca0f40c3a28cf44c06f02d17023ee62522e67425ee0ace684492e8eac2805cf5820834db38d0b15ced75949dd4023951e0991103068951e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5286c7478b70591dd6b6f1f427ed61594
SHA15bf75039ad35ba81e06b2fb1e56c5a01a6f047b4
SHA2568f1281a1905398f6b335febb56f6fa4e72b6e73afda81550829c22296935e955
SHA512fc1f482120ae1acee7c10994b4c1b4dd71026508fac10ce56475eaae35c42806eb76e4859f46aab820becd0c77dc9065e7795574642ca6f2cacf2e618ac8c671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5148af2680bf2f8b6aee02895199e90aa
SHA151c6cd3fe7f5941a420b7904f9bfcd1e0c6a60e4
SHA256bc385a4c9ee0af0ce6943e61b432355da0b5fbba94825e93e5706366acccd4b4
SHA51249ae08de4839602283a55313421ce24185546c5765c2b1061ede8d2a573daed9acdb61ec9d11457e25ba7751decc0fcd3d4242f8fe5394bc75271b493315f02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aa5e702ace7dc8febfb9ab7c8409dd9
SHA1ae7c51776c91d32e4d3484b6a4709dd670f377d1
SHA2563ae2c576645a3ad04c86061812618451fa6725d52bfde2de1f4bac1e0b3b5808
SHA512af9d338382c4754015655bfe244cfd66e079c921a9aa6ba5d3676f7221fd7d93b77dbbdf28518f0c70bc16e8d166378415341f8424c4e7ee74bec83ab12b09cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b135ac1f199bb93e5b6d9e614568ce
SHA1bf3da79f45bfb06381ff0bc663ff22551e7d1951
SHA256e739f622f124b3ccab8b8eb157bbfef41e62166f7411562aa930d9ac420a18cd
SHA512861a56a951dec4a0ef8a25aa166621b1dddcb3a3ea983db51e46a66850ec621c520c240153c03da2e2a28126c08147445fd023e2a20db1a03d389d3c6e2e3678
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06