Analysis
-
max time kernel
119s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 01:01
Behavioral task
behavioral1
Sample
0af44ecaa26646d58ec93b6c3f7db3e9.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0af44ecaa26646d58ec93b6c3f7db3e9.html
Resource
win10v2004-20231215-en
General
-
Target
0af44ecaa26646d58ec93b6c3f7db3e9.html
-
Size
256KB
-
MD5
0af44ecaa26646d58ec93b6c3f7db3e9
-
SHA1
698bb01f7f0c32ebfbcb14e3a9a6680a4cc3574f
-
SHA256
435656e4e65c314b230f998387dea2d701253339447cf976a97216ffc3db3f1e
-
SHA512
5f4af4eeeea2902efcf146f3b43e0ce19be83628cf1f8ec075936ef7db7a7348cf81bc0f6be6cb280bdbccf03d2a8780ea5cea0e6c5fa80b9862f3fc0800f767
-
SSDEEP
6144:cfX8F/BLycQJGdf9TF9fQ/hLy2wQJOXs0f:cUtSJE7MhLyaJC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409541549" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1656461-A1F7-11EE-B2BF-5E688C03EF37} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa0000000002000000000010660000000100002000000086dc755ed4880033c548eb1592cb3eb70e2840255981133954771feb477912c5000000000e8000000002000020000000e341ec4457f7693cda1be8980b32e0f2b76ea0fe4280129e37291f136098e54920000000c5c200cceebd2b15bfb1e8c07ab474302d016c07fbb23ea211c6f713005b748540000000a13235b7478382bb2f7b0d84ecbfe553e6be634403c8f2507a50eca743bafa515372c414ae885a421f850436472951b57fb2c9dc0d0123813767864bf71abd86 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f124c60436da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2076 iexplore.exe 2076 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2076 wrote to memory of 2200 2076 iexplore.exe IEXPLORE.EXE PID 2076 wrote to memory of 2200 2076 iexplore.exe IEXPLORE.EXE PID 2076 wrote to memory of 2200 2076 iexplore.exe IEXPLORE.EXE PID 2076 wrote to memory of 2200 2076 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0af44ecaa26646d58ec93b6c3f7db3e9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa32921815bdbf10f3a7622506b6b0f8
SHA117ab0441d82049236e9ac8b044bee1b80c0425c9
SHA25668698fefe73d30fe4cc8807f7301bb7769309f4d46479f421fb2e6e5fc2840bc
SHA512e3fdafd638dfa2847d5ddd98187361d2eef442af05ed50981a5ca9c0c0e4b806767bc5e55f6f62d26d95ac2f940d595a1d3dd6d9bc3c2f4cdd7558db1dc97193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51393705225a8b11f7b96e85509eee518
SHA11a706dda00e5b0a7a9bf7ebb19bc3b9b8898cd67
SHA256d01699fbd887da3949c88215f02c8609cb91d6c010b0b2a756f9a401441e9791
SHA512038a236cde515d6cbe7e6302fe4b1227d0a1b425b491a6b1b347cffba6ab80533dd6407e6164e744bfd5b8e6a0a2bb021d70e44cf7563949414fd6ad9ac31438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a43676565f25dee696da19274ec68854
SHA108175f4008028026e40738e25070af15d08a10be
SHA256627b4f2033c308b20d727dd222e8357d522de5bec074b01fa71a6db766a272fb
SHA512fc6e338eb76f9270b0c470eff0a02f58bbf70a296eb0f31d3f468357b5efca7568c13aab25fa309597a662f79ac14a97a406a0bd40ef4718069fdd2986d6d23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f91bb5c0ea0e685b1a8ed71a62828c85
SHA141d3c695cba969d9f7bc9238f0b690fae830f4a7
SHA25611f6dc36381afe3795e9ebd046b0f72c351e63aa14b94aeb456bd19a0b9d5fd2
SHA51290a4d3bdc52181976c70dd5688e0b9a20f5a14c158c8dd7852453c7f36622a998ca1d581a055a25e8ba627111f305c5f370f14a80ce32c91205b4eaead52c419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc288045f63cb8797df921220742f2d0
SHA170f5c1d1229efeb91ed63a0dbf9e62d62191e69a
SHA2567565f31e1ed71c7f5976ffb6e3d2609c0ccb1335c99b13432c02dae718a3bbda
SHA512d3c6d2ee558e878e2b4cd85c979ea0a03eabbf5fc69d8f3ed378ca73f010ed53bdb57bc5bc40e0ecda8588d44b41985eba4c589d874989fa9762894659879e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8849c785e41dc2ffc520e30c7cb4c7c
SHA161da9f379735720e973178b83e08ecc5e8d573a0
SHA25628f639147539dfa87e7a530f609f304a0767db5cf9ac5c39a3f9b385285531b5
SHA51254aff0b63142081ccd4c7e71502e94301990752b3fd8c1f01fbaf295ac4ec96c608ecb9bf06463b07055053dedf62bcdb9b87d564077676383e575ebfc4ab993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53727b6de7e018590cdb32b14df470167
SHA1a0340caf7734afbfb8262ccc833762a15585439a
SHA256946e8a7bf0b631eda5e3da5dfff4ad5cd426b96daa37d09e1285efe33caaeab8
SHA5123a88aa8be23ca138cf741ba030849a884c2c5818ff1c817b5ab5a82b483ea0c4044a532022fb5410c2777b0cf948d94d1cc4627559e9454ef6be49282a929daf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06