Analysis
-
max time kernel
142s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 23:46
Static task
static1
Behavioral task
behavioral1
Sample
1aa448cae6ef707d6f4f3ead62c230bb.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1aa448cae6ef707d6f4f3ead62c230bb.html
Resource
win10v2004-20231215-en
General
-
Target
1aa448cae6ef707d6f4f3ead62c230bb.html
-
Size
70KB
-
MD5
1aa448cae6ef707d6f4f3ead62c230bb
-
SHA1
ff5b1689fee05ca57001c26a9206d92569e7793b
-
SHA256
dd35e8932843e9df34019ffe8af9c5f2b9c57f9e8cfee2696e8cbc2e7e7527fe
-
SHA512
40430efaa847bb08b9176982fb552c4611d426ec37766a55f83174aca04fbd3daacf1d4940a95e0f4eea77060a9f87c82683bae17b1100064d7c05357186878c
-
SSDEEP
768:Sx0hqGbIiP//mdvsYSgLj/DVWmTMYq8Dfr7Vq3t40MSxjfLD+PHgkyMrj3DZ+/VH:S9Ik/ctnwOHjRucT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03402391-A3B1-11EE-9B8E-42DF7B237CB2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f03fecf8bd37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409730995" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d30000000000200000000001066000000010000200000001cdb3dc2950f97953da05ebbbf857c4eeb36fc36f68bcd18050bea3eeedb3262000000000e8000000002000020000000a9bbaafe2fccb06470db8297ca597493f04e787bac0054e01eb236eb59ea257320000000cbb960fd34faa0d8ae5e633296799d64f053407ad7c5cd7a281009b0ef22fdb540000000279bf978c9905d3a45653d87bb76e25fafdaf161160f8e35838b4cc244d63c32d3a443b5ff021cf360ea55e349df6b2f7b8fe88b80761cb4c8904400ceccd5c6 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2696 2116 iexplore.exe 28 PID 2116 wrote to memory of 2696 2116 iexplore.exe 28 PID 2116 wrote to memory of 2696 2116 iexplore.exe 28 PID 2116 wrote to memory of 2696 2116 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1aa448cae6ef707d6f4f3ead62c230bb.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b627db34f48f09b75d4c49b53a50f6a2
SHA1e37773398cc2df7a7be6c2187067b95be1277414
SHA25687d6fa8b7acb55f20308548663e288c2c5d816f243c128f562f6dea5928bbc4c
SHA512787b4330d427716dc79898a602d055da9b23a5e88f932b0a400fcac4178378f17f9698cbc3c98a7722dad1be0734207c2354712d46634a50da045575105cf443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2c002a995f449ac788f36635c47201a
SHA169077049a0cf745f790bfaf3fd3bb0a518548a4b
SHA256281f4ac3fdfcb468184d16f2f431140663c6fc0e4adb9a2a382e71f4056b8d0b
SHA512758529b35b11614a39f0205f894f754169dd3889a1c74962be44213bd7b6cb23bbe8ceefe99b1a6018ea2d29e40cee0b47b2f22cfdcfdcb1342703b0acaf5eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4b59d0b848fc9c8ad27c68bf26c34b1
SHA1a69fd687faebad5fbeb61d3834f020e838ea19a4
SHA25655e36eec7caf8bef99570e3e2a36f802cf63e4323bc58fc17863cafb933fa844
SHA5121be411f62e38b6dddc015fd7e4fd3a90c759de2365ce295d1c1450deff9b0606a009e82a901fdd798a1fac7be18947c466a5202e14b643c078e012432e641d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6636b14a418308cda2bf801fe3e0f7f
SHA1664368606bfce225a986d4bdf253e2d344d50cb2
SHA2560a7928f58c63fba144d4c56a94170bb81dc0659655e411c003f919d9ea0b671f
SHA5124078141049015c54cc627a03c15beb731aef4f02a6c0be9c869ac71bcb5b37c6ae7bc3997e251d6925f72d9d3df41de68c5fc68a29c75f66650167e98972e611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505ceb7a78bc72fcf8ced27c4f24c5f28
SHA18838f80eac03a54e0350c6d66cc9047443725a0d
SHA256e097d8df249ced7a1fd63bdc4a39a0fb9dc461a05c77cf93e4c7f063fde48d8c
SHA512b7425cc850d13ecb84396fccc4005e82ecf9ce57dada5a76eaa42fd4e4759bc6605b7c684d44408c5a412375e7fc9f6f9ced6b0104a2494522d6b62ffc35a553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2344b55ffad0f1441c3892b2c6ad7e9
SHA172c711756d02ecc26e50c40b65a2c6ef944cbf65
SHA25638ec67cee030cc0b6ba0a77c138ec8895a0737932d2db30009185020adcad250
SHA5120c23318e6a877962fcc1b34878ed50bb1811a08a25c510c19b8df4cfbe8392c999efd4dd50a9a4ba634d70c15e2609a54821dda35d31050d294742ed6da3f2e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb25b2d11ef3fb69b3129aada8ff6266
SHA10b2c82efb3e57115fe19166b9100c4e97880ec69
SHA256b73d95efc7a57d8bcae9132cf0113aa06e7244bfde468fa5a225856e9da80935
SHA51281471882425099e3f92d24f6f2eb590cb4b3b369c37461ed394787a7fb42991dc8e7e347e91be5e3a66225beaa252aa6aa74d628f89f7d5e98940f023b32872b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a8d1e19bbac6e746de070f254bcb699
SHA17f81cf1bedfa5d322456a2f5b00368c5d5af8fd1
SHA256243fb7e5975c5a473251e8c810ee902a6593753bcb84761a3582c877388b8e8c
SHA512a777f42bd2e48bd2aabfe6067037d3ab1b440ce0d6f22e75390969b0e8b95ddf93fd3ed4e4b07eb59a0cd9c509bf7ba77c8bb350f434903c6ee74b4089d20a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5917dfac965e8f60b8e9c9b04d5ae0001
SHA1c1962aa79ba62ef0eee2f788acbec00ea1b3b8a2
SHA2566670883b171e242aef7cad35b925daa71519c7d63c8c8b6e3e0c82667d8dbd2e
SHA5128f26bae21ada17823afe24c341502aa40119344b372061b0726a2c92d5b8601d993c87ed697a18cc0752a67055342f27adfd488174f0f8f2260440c4e12bd72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531bf7376a88291ca337b2690d7d9b396
SHA1b520a4ecbc8bdc4c7d5eb94f276c172bc92fd3b0
SHA256dd9ed52d12d2f54e323cc0b4d1ffe06d7682ef1beef2852f26bb085a283ac6ab
SHA512d4d83b867d8724797a82aab1c7aacb3d71468b344fb6abe9bae07e9c11be3423e510e4575920a56674444383ba310a7f1af0805d591e1b306896251733c4da5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c087b04e36ec5dfab06937944362f4cb
SHA184fec47e4f3148d4ce25d60a34177eb4d4a60127
SHA256f8b7e61cbbca0fcf84746363eaf7be8325d2164154fa938f000f65a01576157c
SHA5129b27854caebb11d8ac2ffa685bd664a552a638dd43d4ce68187b03499f6544ae513fcf107b67875abdd740913a7b2175b3627e8806a29a04dccdaab217ed66ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589be09b89f9d93e4d2164d248f7af5e6
SHA1ebcac601ce79118e9dcac44fd6159a480ebdae3c
SHA256954eab31b2fcd4e3ba3ad54b3a173f37bd1e26f148c2bfccb825ceeb9f2db096
SHA5122a100c05e882a52b6f179cc2ae43eb8eefcbf92e712169bdffc6d20e5ab44f48436a1c7db22b0f5ba76622bf0bc519460ec74e28bceed5a05ba2c8325ccfd677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b204df9d43d3fddc73033defefa6824
SHA101364313f096f4f3e708f4b22e048d14c855d1f1
SHA2569291c796da4248117670d2476f8228015628832bb8354f4bd0aab246e1e90add
SHA51237b8a20f0d6865133532b931ef1cfc58c368eff6f8a85476a32ae7ff42a812114e656cd7130829ffbb689fa2339b06020f0ea324c479aae30e95dbc5eba5eed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f868ad23373894670a35ce1230398f26
SHA14ca8ac4d4a3c25f71f0cf6ad2191b5d45f32a183
SHA256f918340684417c9a27362de2a3162f19fdc397b84eb304a5dc3e6e00932bb048
SHA512b2bcad5ed544ed77383a0f771e7288f3dfea017ffdfdc7909be19caed748d6123e86223c20d8f62d6bf9f4ae9de03919dbb0afe5e4a8ed6efd950b0cb9e873ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8b55fae1d0ecffe969b9ea1db022794
SHA12eca91cb688553355154557af9c3285dc1c7b5d0
SHA256f7e15128756b2ff444d5e97f71fa9859812bc98bb276d2816f90daf703fc9684
SHA5122874da946f8f32a15f7f07436bab4015e813a66754b6d94033c6169d507389d1ce853b37e46811156b43f904c6bbdca91fe208a7f2b5c8fffb41380e1e220bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e9ee3b79f2906190cf589264d19a91e
SHA1554bc05c18949046609059cd2a58399d5f546638
SHA256c885d0faf7e0b4c77f6bda6f933458e35f0d89d4f0f3abfa57e8614fe944502a
SHA51250e6dbd520217bd2d61fb832c0aafcf8f384d1769c0bf1a1643726df27349c0e7801b08719642766f09ce3509ba88f478f048408a7469a14a12c77758eda2f75
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4K0WM73A\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06