Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 21:42
Static task
static1
Behavioral task
behavioral1
Sample
1375e4446c6a2a89f11999484dc6aecd.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1375e4446c6a2a89f11999484dc6aecd.html
Resource
win10v2004-20231215-en
General
-
Target
1375e4446c6a2a89f11999484dc6aecd.html
-
Size
53KB
-
MD5
1375e4446c6a2a89f11999484dc6aecd
-
SHA1
096ba2060e17967459f3cc4eb149e4c8b4c53e34
-
SHA256
ddbb127afde1e3237911a09e9c415d0aa724696dac25ee31017727e2ddcc9774
-
SHA512
a185acac98e4034649007ca26a6341c04c30d5f8e40bfeb919eae17696012e5270cd7997f4abc7a1386588489cee7af398e83553d20d5679b280a3bde398dea5
-
SSDEEP
1536:CkgUiIakTqGivi+PyU4runlYf63Nj+q5VyvR0w2AzTICbbDoc/t9M/dNwIUEDmDS:CkgUiIakTqGivi+PyU4runlYf63Nj+q5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000fa3c74f3bb7b3e6bd39296930399c53083e072330b7195d3b828a57edcc8810f000000000e8000000002000020000000c9717aee87ee4bf2a7f412386260f94a6d14e94a7092cf1c54ac8b3d28b95fa2900000000d1f3799029dec433d9e1bce8f6c9587d1e8bb280647410e1ed9e7c2c4f83650aad3a49ee8fdae79b2542c5986cd4f47528fa6a31f4512fe875f534fb459275487b2a02c05de57c3510c4e4d05620c36eaa4be906dcea3f823f323f7294e101720cfbda9c15cb8d17cb2a1fb18ff94a0c4fa522d0ca33950b8d740ef3a79eb4881debac3294a48da1e01b51920c6889040000000c158dce68ccc317e27607a75c768afc487bdbb8ab3e18fe8952b1251094071569f21d17f62bd4ece85eb050880ae76f2f7c67faebab52b57ee5b05d6802376d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409694017" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506566cd6737da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e9178664000000000200000000001066000000010000200000009e1cc9f1f7924ffc41a814a141a31fbfc34cfb9b16e4b4355f79847287732284000000000e8000000002000020000000e6d29806b7080655fa9877bdd6586fdd04d5b22e274e1cbe431fc490212cb3d0200000009d72c58495f51389a766e053386846dcf7185df94b95872d47460003486f22af400000000bfb0cfe5daf4abda34daf440778272466696530de441c2d505df32432d95237442a66c484ecd1115fc5936e7293630170d2e73aac8b7ba98cf2b22704c2dc69 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EFAD4C01-A35A-11EE-98E5-CE253106968E} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2424 2348 iexplore.exe 28 PID 2348 wrote to memory of 2424 2348 iexplore.exe 28 PID 2348 wrote to memory of 2424 2348 iexplore.exe 28 PID 2348 wrote to memory of 2424 2348 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1375e4446c6a2a89f11999484dc6aecd.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6c2f0b97bcb67308ab590fe4a4c77e7
SHA105d10c091d035d67ed88e2333f74ee8d9a666055
SHA25680c035034fd2353cf1bd43aa5174f510b97ad8f7437ba00fff89228956dc69a5
SHA5123bbfab8f02c15ccaa622430187563e8460b86e75ec02b3854a55c4d372aac82ee9e761ee7864e995d0281449de96728c9d6b1b64cc1b3b03c26e1d8f8a165abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552866398ed5e038d124d8faede7ca2f8
SHA1d38dbfded2cc2b20600d1de03ce0349aaff1bc89
SHA256e2ec2295184a7de65e8037b239e3c90752c9742f61d3a70fccc68be01e192862
SHA512ba6610ad5eec990026aff76547814762f82b0ea620ed6481842874800bdc52a36f22faaea98ae52a4d5d94f7dba16e2f81f0e07e3c5b693cae67a753e2fdeba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566aad1d394102d85c02b9f77925e799a
SHA1ca6c32791691fb7b46a94bd338082d12f0bdc716
SHA25666b12a5c226396712d1e08ad6c71c54df48a438bbdb42535474e2bc3a767968b
SHA5127fe3818cf14b7b4e9df81ecaafda7ffbfc8975b733f62a9f6bb9af70a3561d5020029e7f8b9016c90238a80d8c4fa7be17ca94675018e005b0708a307aceaa36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582900b070228ea911717a8f1a507326f
SHA157ad728b8502cc73722fe3fe96edb25e0d1a1a9a
SHA2565f7ad2edb1cda6ec1be05daab5c3ad3e523b57caa8e7ab36fa7b0c30bc2abe5f
SHA5121631c27d83709d7cc6a9d0af79a67c69cfcdeb0e4c2d851f2bf7fc62feeb401a351258c39fb78fbf5aa07a7a0c158bc240582eb7257e238538cb73a96e67019a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad533176945d2ea819efffc935b82a1c
SHA1f483b15593829988d28fc01d925d18964f800f9d
SHA256e524b46169e61a30f916f47ce9f2e8ab9fe74c66955923217441b2f0111a5540
SHA512ba0f15b60b228209fc07ccd82808ae96cb2c7b9268be0ab0d2e5703c30784d2a12f06cbffd7b2eba48f74d1f9596493669c03240e61a0e23af3bbad6d6ddd526
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YV6H14B0\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06