Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
147549d154b9ab6e5945497e7f9ee977.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
147549d154b9ab6e5945497e7f9ee977.html
Resource
win10v2004-20231215-en
General
-
Target
147549d154b9ab6e5945497e7f9ee977.html
-
Size
9KB
-
MD5
147549d154b9ab6e5945497e7f9ee977
-
SHA1
e38e79eb8769700a2a6b4a5669260f91a0b7f3fe
-
SHA256
e0c4a2ad4c52b8a07462e03664964462b6b2c1dbad485acec02047b8afa6f733
-
SHA512
6d5b6b36ba31bad4ce16fe5055e811d2cc3d746a89404aa27e3cca478faff70da5834dd27b3bf293b80f20a1be52396533174674e805a61b60285b0a3c46757f
-
SSDEEP
96:uzVs+ux7b0LLY1k9o84d12ef7CSTUdGT/kPsrpUlVHcEZ7ru7f:csz7b0AYS/QAUPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000001dc643114026c5027617e4fe01ab8f8353fe73085b5a8fe6643660f771352f5a000000000e8000000002000020000000510a8ea838302bc31ba722207950e207d78f16cc206eda533f229fc53fdc83e620000000045a068eb3ddd1c2081330c1fe4d266eada6e6e19dd1a99f0ba51e00868c06b640000000189bae06232b3754c2909aa0c04eb109eb8b46154f23666af59c1e31474c3e66ece44c9cb2f66c614b937401c2fedcb301474353dd1cb3f118bcc751965fa9d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5114651-A368-11EE-86E5-EED0D7A1BF98} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0be3f9e7537da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409699955" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2708 2912 iexplore.exe 28 PID 2912 wrote to memory of 2708 2912 iexplore.exe 28 PID 2912 wrote to memory of 2708 2912 iexplore.exe 28 PID 2912 wrote to memory of 2708 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\147549d154b9ab6e5945497e7f9ee977.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdc8c8f0634035b816ad01c4501a9230
SHA1664ee5006b25f74de84a2022a17708f17675c81a
SHA2568fd2c5af6c9890a11ab82ed0e1c946b616e38f6d1b6fe4f40cfc9fbb9dad33f5
SHA5125df0cc3b0c33768dcb61872e2cf0455269c445c14dfb7e59dd278e1a6d6843566272e81baca20cb0fb25588cf1a518bec97ccd386da1fd76595d7a8fda66bbaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531353ea67bbcb01dae860b38307bae8d
SHA1ce423dd9e9b4382a405090137e3c04e13bfe0bc0
SHA25609a03e890df7f4e9ace613b0c06e9a5cd0f6bd4c41224314c9adc91d6b2dd686
SHA51209372b5fc31201b91f28921ce68944e3801d3432c5142595ab372fdb6c525638505d4a377d375e27da4fd15bf5b5e85a895c1ffd3c604d2a4fffa0b13ef25a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d180a741e148b3aa5d73b56b87ea381f
SHA1ef31c5a37a958659f21b44414c0025fe790a1e67
SHA256b90c73a24a6d6170ebff935798d7657438d0f4c4eb392c162bc49848bdf42f73
SHA5124728515b8736c6a56d5575b6e75b9d0d3a1a7bb2f58e908b7336a4bab9ae657b5ec9f5058abf76be6a80286db4e8430a9200701ee2f5c9d42ba2af32b3d2854f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55851bc6da8be5889098eebb90e06e083
SHA1dbea3d381e61b6bc871f2170bbb51727b77755d0
SHA2566206e2d9ffbe2944fcae4a13cc03a73fc97a445afb1edbe17b5e4c9e54a00d79
SHA5126ac3805a4bc773245dbff171080a1d3f783ac78029344b68ff5035e05b1b5e16c4b5f39dbb41d39b8e4ea5a03d7421b447b7c1f2413643eeb7d7ccc2974064e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58132d88b449cf521a1f134802ee37726
SHA17819be7874a87abc7ec79f22c19905c8e1206b74
SHA2564149380450da52d284e14181c48d013ccd7e3ef7c0c1c0c42ba1a302dc2ca88e
SHA51227021c297a557a6e00dbf5ce61bb0f987fb4cc172b6faa73f8a611d40a00fb52710d811d11933f1a46d76cb42cb3c49b06ac3f36a339bf62303e64f04cdad8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fa5f52b82665c6bc47f1255e3ee58f5
SHA1f61948281a035dc6544dddae31626f8479fa004a
SHA256731dc73b89ebf158a94d985e071e5a5b9e926c855748984eea501ef91fc0d9a0
SHA51280fc8027efe4e0081655247aa0ab51d75f0afafcdb959f26a7e825eea9f28f08c6f8ec914ea69edc78209b2f231e395af2f7bdcbebd6de4e9e4479e8ea890dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a159ac969c3051d722579a009b39cd85
SHA1d4806cd4ba16d6b90f91f8a46df858103f8ec6f2
SHA256ff23a618296ed8abc86a954260b065b4b965041fc1429e9e4cbbb654426afb19
SHA512e0a4309fc2515f258d29f3a470ae8d88cc84a53caaf9bf5b150ee4444242430ede32fc5428c2189ca6c91d9765850434b39a4d83210d70d0766d27e8a0e5f4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a343167fd7c63ad6a37136aaee3ef68
SHA1828fd5c1564fc279ff7d7ca21c4c836c1d29fbc5
SHA2560e149c51a5cc70a1b250e6120c42b8db3531cdc843cf2025668cab376dcd6a4e
SHA512dc81f684475f57d845bcdec7c9c477465d8126f6b551a5d660d275659dfd93e4d0f1363a11fbe48a74b92c07ee4891e5614b1ae82be4751dd1740d6dd3125afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deb8930fbec4d9156e61b4572506e798
SHA1635ea6efb70bfa4a3806c78e7020deeba39a4b66
SHA2561588b390d8772dd66c85dc6e9bee6d99b8fd8c130827520962aca706807b5a6f
SHA512db549f8c1f2e54851c46dfcc514399410358bceee76311652b22341e1df2843aa331868cda6cd2a8b522f6a477b2a1dd3d7d5921c74c6ae572f7358fb802069e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a65046d5520e5ed95c0fc7d9ec11e86b
SHA1f85a271980afcd2f521514b69fab9d8df04f7697
SHA256bca282d6e65824f2ff5388c25fb64fea69549a93d1289b338f138fa5efd14b00
SHA512664e273c3fa25a250fa424f71c5a7faf9036671e4b6301de72c9a4dbd2d756c62309072c42490d1b525def50e1dfe62b544e1f70596df33bdb6aa56e0889aa8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baada300fb7b44f6056e5c30fcb58b15
SHA1a0c0efb5961e6dd5e1fce14d1e0e128b7785c5c0
SHA256a53be2fc09092bcccb5e4ee577295a95e3766aa2b214abe6cc0db952b8006b93
SHA512555faeb6120ba49bad2934da42257ba9b188529c037e82641c4438bc9166a8b725c6b374373a007163e329d6f922a4ac0763d4e6383522cd838375a3f1b6d5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55118c02468d8752388f1e9e3d481b095
SHA10e2e28955466d78a64c3e506fe39e4ff98ae85b1
SHA256371b3229191d7e8bb26adacfb68d38d0fbf3c6cdb5e6a96e2a8d2be6b51293f3
SHA51282acbf9d5f8715d4d27400efb5d76c341a7a27b120676edf85db976cf8a532a5444e4672cb4a873e85937bc45d367c9a66998491e4a3d5795a418d96b228b3a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e07682155dfb18189290addb58a4dddd
SHA1aa18b34628f8a141ed62c38e356c1b7e888492c3
SHA2568108acf71d76b6ed594f3f72d57e1349272985dfa61fa445676e3c1a19070a3a
SHA512858b2f9060e2e79a0c979a17daa4447aa0fc0197d0faa99837110edb266476233a2f7a5da2c0420a001abd05c0bcfc1775d4e1aa06cc4cbba16f1b059b7991a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b7fea5b9214cfee45d94d01a27efd00
SHA18614bd41555f5e09d183f6040a187849070e66bb
SHA2567d69301f6bbc0ef15d36fb289c3fe3119956495baf9d1966ef128e41e8ba4b26
SHA512b0c8b12d37d5e19d88145783778c1cf182eb71215f58ca25c962db30e96a456fd8021f953389c25214228369169f76b67c66fa0b2cd65dee4805ff5241ff461e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5fc956a161bfbd18e98f1e20ad19bca
SHA1e81ed615e05af0ffdbe8fcba44dc12aaa3bc1c42
SHA2567250f0ce1e009f1f0cd32545a93b2871b79f657f03922c6fe7c90ec5e4607fd0
SHA5129ab2ebe832fd0c194ebeba3e324c19e0aae94c894c6c743607c1a7489956e4564d53d6233309c1a5cd3b242a7d0c8df4c3cc4eb58eae3986b8998b86548acc52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc2df38800d378566fb370811c37623d
SHA160a32363059d8b2aeb484e0511e937d6cd03ea88
SHA256b85ae056049a4763ccf034d0d5fe53e0086700da7cde4e43ebfb1a8a3fbd1c7f
SHA51231a99a41856875ffe9f42ae709244540e64ce98d64a9ef19170544ac415133003bb7f7ac1058c5dadeda4d032fa760e9596bdbfbb4cb08286e2e4c2931e80004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aec84ff46b2f0d94ea5f13240ec6738e
SHA19572218299de19e3ccd71ab5809f59e5c37b5bac
SHA256b152e5059fd16d934989e2ec539ddf83be91d283ad1d95aaac2aa87fb677d946
SHA5124c5de34848e8e0b3fafca38b569cbdbffad46864442f669d17012aaa2394944586c1bebea9c84ec46901179fcffa9f7683403d33bbe8576a727f1df0725f3596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d19ef750b3d3609f6c2076c2db4d0e4
SHA1062c0a1bfed9ddae15a96d229d8a06bca55d6bba
SHA256975fad8d2e010a2db4b78530bf9d52eb5ce0da0a2d824031413cb0f17cbc7269
SHA5127307f647a89df179193e30bdd664470f595b7e8de1a660f0ea163737ce440ccc2179483321d4dd223cb0a2ec160cee2b6dae02c975e3575fe0a0dbc0b31db245
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06