Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
020766f9f1c89d238fa29859d29c5bee.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
020766f9f1c89d238fa29859d29c5bee.html
Resource
win10v2004-20231215-en
General
-
Target
020766f9f1c89d238fa29859d29c5bee.html
-
Size
53KB
-
MD5
020766f9f1c89d238fa29859d29c5bee
-
SHA1
c8985a50d2f0e7653d61bc807ba9604535f4c9ff
-
SHA256
e346a197674f774231bbb9a1c9eae6e1d56fc0b704a88472fe97244100581ea5
-
SHA512
090e10c51b3c3de30940c10be87cb70246a056fd876de090ec2fa778610c6aa01a2e19a8a0052b2650b8aaf65a3cac9052433d6b95964156bdcf1ae97bf044a8
-
SSDEEP
1536:CkgUiIakTqGivi+PyU+runlY963Nj+q5VyvR0w2AzTICbbeou/t9M/dNwIUEDmDR:CkgUiIakTqGivi+PyU+runlY963Nj+q7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0bc96bd7f36da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0B27B71-A272-11EE-9569-6A53A263E8F2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409594297" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000792648db1a1b9c77c5aa410d1de62b693da664a17f1e1e0e4584d8b28631648a000000000e8000000002000020000000c7be1152365b10c85654519b5b354d16d61720c45d10f758ec6d18c4270e461920000000821467c765a59889697f3e432e90eae8afb42dce0afaddbdc28a3d92280a46ef400000004ea1bb16a5bbd4bc34930836d0f0512c52bfbb55f74004cbb1bc42586d9ad3e48dc5ab25586b8142eea04e3e10a1467a91afb1ce06617aa1242ab87feab3c78f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 832 iexplore.exe 832 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 832 wrote to memory of 3020 832 iexplore.exe 28 PID 832 wrote to memory of 3020 832 iexplore.exe 28 PID 832 wrote to memory of 3020 832 iexplore.exe 28 PID 832 wrote to memory of 3020 832 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\020766f9f1c89d238fa29859d29c5bee.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:832 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58775709a1ec72789adf0041ff28598e4
SHA1f873057bc3fb2935be2b7f1fdaa1bbcfd3a28a6f
SHA2565ac2356684ecd3ecc7a77cfeaeb092b09b05d9426c63f11367f1af08d3cb78c4
SHA512b9b8a53f8ce04d105a2009611164fc064f8eebbeb986941ed6d5d3d2ed4566f8d82672cfc931267fd3a0da44e8e7d56fe89faf0a164ab4304fa32a93d957bc3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583e8c2d7317449dc65a6591bc6bfeac8
SHA1e2c2835b264859dd2f2e15c3600a746cb10514dc
SHA25633d5d6c354b42b90a5e7636031abe58896d167b9eee08b2aaa2935e6d2fc05cc
SHA5121b40c9dfda847fe2727cabfaa3b57fabec57208fde7a70f394970c28858441b531703e35ffb62cf59e18255375fed12d9aeaa52c73ecbe6dc1a00660eb01511b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550146e5e77f4672e943749e726f82ead
SHA175c8fb3636918cf43b01685a96e1d2fb88088470
SHA2567e58b19559edf0bedda08bd6ee95e91cc6ae002f7597aa04ae628044dcc96034
SHA51238497f810aadf30ac8656ff90181d2347554cd4588244dad2694f26570e20b9264fd177a4002324179652f0f70b03c09bd308d90d03f2c8545cd21356194e521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ce813de938b82cd6993beb1f17bb6ca
SHA1714ae7531ae18fd9e73771135e264ade9757fd6d
SHA25672162908e7e7a064d828bd6573adcfa4635bf0386850242523ef38110d734815
SHA512262ba12dbb6c98ca29a61950008a96d7767654e4edae56c50cf3e667f0fbee25360663c9ba6c67eeca325f7dfe231f0f54c01bbe12061f764e94abd6cd20f716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df8144fb35001567d9699e2a57383169
SHA19290d18d07cc8770b4faf18eb069ba6b5fb37504
SHA25688d56a13728d9d6c32eb5b4db5ff254ef3ddcaae5bec296d7231f427c0fab189
SHA5127f91cf54533a999b93cc7b888ee8f33ab83eb0879dea390b7ec6e7c2165f423042e5ecb70ff3641d803dfef25ecedf96976dd18bce1deb40058fe1145c6ffce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b376f16763c165bb85155da5a33349e
SHA13988a842a6adbaa85f3031be85633e5497bb8ab4
SHA2566bd88b42806282e993d108b1a4f83cfb171acafb5d0c4285185ea57525ef3ce2
SHA51280ce9e15367f0ea1a8e80cac5fb6e120bdacf5ea432608db2514f30bcaba05d3c9ea86b413fd170f279f568d10b5b6af29368a0a754607967034feee634e8751
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4K0WM73A\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06