Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
14fd9386daec9e702269f1e192dcc6b6.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
14fd9386daec9e702269f1e192dcc6b6.html
Resource
win10v2004-20231222-en
General
-
Target
14fd9386daec9e702269f1e192dcc6b6.html
-
Size
45KB
-
MD5
14fd9386daec9e702269f1e192dcc6b6
-
SHA1
4c96a028846c1595e55ff4ba815086e383c1ef71
-
SHA256
dc2d8fa395e7983de31025c118be655e033e95ca938d3e27ce8563220ce41fc7
-
SHA512
c4b29c77041ab053d8254f9207abe3ac6683b4f0f669f16d97a6590684c8d2b4c38ac7edf67a9425061d43cf8f42fedcab398ac4a23ae2427bed07eac95d1e70
-
SSDEEP
768:Zcd9QZBC7mOdMcupC5I9nC4v/orTbVlA8LT/0eDS0odnTh99ojnj0tIMHe7duX5n:gQZBCCOd20IxC0/orTbVlA8LT/0eDS04
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6C8E7F1-A36E-11EE-8DE4-FA7CD17678B7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409702509" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506242a47b37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000035254421a7fa2383fb4fdf74673a74d973c050c20b9448ce4328838a57422177000000000e8000000002000020000000e6483b9ced751f79fa167af3a6a005ef28d1c03bc60d221b30c23167a93f1eed2000000077d84e924279e516242d56314a0aa26ae5c8d7390a563807a9328449e67a3bae40000000392294323eac7e849d9156dcc5b63ab0222ce2339d638bf4cffc49533b3a312620cc2049a494680201d7cbf15cd28b12ee54a740b471b1c0c70ac76d7641ff56 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3008 3044 iexplore.exe 28 PID 3044 wrote to memory of 3008 3044 iexplore.exe 28 PID 3044 wrote to memory of 3008 3044 iexplore.exe 28 PID 3044 wrote to memory of 3008 3044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14fd9386daec9e702269f1e192dcc6b6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5449ab58c4c05a2cf479aabb3b74fe382
SHA186ac08e9f8998f9f3b788da0f753a411a4433fa8
SHA25631fc57c6084e893d5141174110432ee2177a454a4d63fa755861f8cc56393805
SHA5121a757cf4b40c147e5c16ab39928a3c4b8f4e32a01cd0c5dae5560630b4d1c8e573ec6ef0c7d3f863b7da7946c1dff4ca6fbf944778a980c9cfd10ab58f947f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9a98c999d54c7555d4ce7679d1c91bc
SHA108ddaf36bf5351e4c61b91510c4fd65030d5c3f0
SHA25632cf575e164a9358b8e3886958a4a1277d6c9f38b7139cc3396ba8b0e86add94
SHA512a0f0e1f5449e2c737a52393652bb1490a56c77bbfd2deaa90378992153b84d18933615f58a66e47a1bb92246343a193ee7e95fb4e9eb4eaf122fb02d3ceb6904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5738cd2e4c8303cbe7d02d5fac736034d
SHA1eb26b5081629f526503ce0ae06440c18725e6a18
SHA256cb9b01c3b783e809872d895cc0cdad0fdd569e2dce92d5662d9165e4a57f72ad
SHA5124b6db0135d454c55563645a15f71ca997b07a82af5c2dd4ed39e88e17b9aafc206fd80c04fb5f762a67c3fa1775a44768f17732274029d7116ee8aa66382f52f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54be0ea27b9676014af4f52a29ca966ef
SHA1dfd5b67b20cf3109ff84b15ff899a8c971786790
SHA256aec5b8d2fa3d9a88f4bcb3a99ff2bcc16de3c871521597298033dda28d3e0db8
SHA512db43acdeb645cccd5e2584c9f1e1bd705057c83a6e650b7bb84798a0b236da7ec47c9759048d6b843c08830766d8d9f4665dad7229bd4843d68c6708ed629e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5719ab23dd6abf9c765132f1c5894ac
SHA136e5bf284821988df69316e288c1ade62af3d783
SHA256f925bc7f5f710318b4780f1100195a7c5825359fca15aa96b493fd57b2b6de45
SHA512c542d5205985c92939c983408227691259218a8296cdbbf20c8cc86835fad346fb6e014920bb6a657a998a35b5a7650503b323d10614b97f8317d0913aca92cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5736fab77973a9027652e567447557e26
SHA100bb9f3f01cd65c8c923137a3a7d9cffa2e0694b
SHA25642484fe2ba74eaa8e84a8d78466780f8d070a709a4ae6d48cdead51d12703a18
SHA5125a6920d961066b9740aafd86e8edff3a0514391f202d14f6348722806e010bf67abd0c55f2cc909bd822660b70f79e01d94572dbb5d0755ee02202b9f7dbb030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5971bea79047f7549458206cb5ee8e188
SHA1b760f3bb3e32b55a7eb6a9e71e3147b63efc7899
SHA2562c3958902c1aee3ba271af511212c22d751ee1325c0999ffd3383081ee54c15c
SHA5127078e39d13e9a117fe900f2a5480b8d6f85d88819f0cee048e40e16f7ba6b8ba9a2b55958b4bc1e14c62d59a75a9adc945c9e160869ffe3890c843fa0813bdb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06