Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 14:25
Static task
static1
Behavioral task
behavioral1
Sample
00b765eff52e25fa0a946e8491cc09f5.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00b765eff52e25fa0a946e8491cc09f5.html
Resource
win10v2004-20231215-en
General
-
Target
00b765eff52e25fa0a946e8491cc09f5.html
-
Size
44KB
-
MD5
00b765eff52e25fa0a946e8491cc09f5
-
SHA1
5440b9934254a2335decc4302b4d95e222a2c338
-
SHA256
b79e43a1c1287e65f3573684d807c4f6b350876c83f6083f4971896fb3975173
-
SHA512
cd8c551efa2dc5562d56cb819953e93ce73127e5a118b050c11112b5c1ab80f733c8a6d903c523fc497e7ce74d6911e08f3711e84e3d17c3c6445a9aaee28141
-
SSDEEP
768:mwS0l/sGVLsk8ejW4mTNn2oXMelgukwsYHobk:mZJtBMelguj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401d5c987836da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FD76B21-A26B-11EE-966D-76D8C56D161B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000342c044a642120f31268378c486c0a22600b26db99d379db8332df9cf1afba08000000000e80000000020000200000002dc94c5aaf93e4cd43e66c1eb9c7eae94623ad67a57836330776d47bd6e9275e200000007564c6560e91834cb492a1ef061c56b4de72b7f0483947c3d09abde5b9d3edc140000000f28809985ae2676fc049e945917fc70010b1746125cec147bbc523349fb731055c7542f704c98b5c0c31a929b6b6765ddf8c5e6efa9429a0fa8c0257bc4ca5b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409591208" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1972 1984 iexplore.exe 28 PID 1984 wrote to memory of 1972 1984 iexplore.exe 28 PID 1984 wrote to memory of 1972 1984 iexplore.exe 28 PID 1984 wrote to memory of 1972 1984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00b765eff52e25fa0a946e8491cc09f5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5012da7f82ed6e3ad19a73d010abc06e0
SHA1e581d65aa99291f3be017a15fb2946aae23c7bee
SHA2568635d8e18f3f0060f1c8af855fcb7c15df58b86d668b7187ad5cbb1aaa36a06f
SHA51297be02cdb59f186fd20353e23b738f5afb09130b6164250cbc241496e82a9b6949068804bc3cd59ff036dc9e9da0be244cb90460d7ee099fbec0e1a0b18dd918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f213b669c03e4e2318a67dc549ff3f45
SHA1197dfec45b61558e5aad9e9be32eb96106753dc9
SHA256993b5dc312bcc340fd469f63634f2362abfdfd4699bad648767fdb6e2ad1412a
SHA512f99ba93826c371d675804a22137abc964b5464402f0de0cb0d0e9a98164e4126732fd0641f91cb5acb41d8d47bb95fc7dfa593857f85f3114d1a81d772202aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a3ef028808248b48824fa585ec56fe2
SHA136d0f0f44803bd0abfe0e85e41173a7ace01f242
SHA25635cb829776cf28c65894a2fe0838d7b499bcd45b5711e7614d56be6139cdaf9c
SHA5128629a567c6594f043662b72ef48091d2ae4837bfdecd159cb551b2b70e364c58fe1fd55dcb9379f9e17ac7a28b4d4f6d9827e1e6f75ed02d5b03ffd46ee232e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514fe1f63c5d54a70fcfa2f78e2990116
SHA155da117b11ff24a0df51cd3946c1b79bbeed974e
SHA256856fa5949d2636c9672326affd6c7b0b8e029ad11d91d76696b6c7432e1a8f51
SHA5127e0cf7420fd71d145033c22cd56d25430ab4f7e3214379f672b4fa81751714b08967cbfd85a7b56a406268c691d7037fd1bd5bfa3312d7794a5256bc15bb064f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d7266b68767e4fbc94f5dbe40beeb1d
SHA183e501644ead3e7fc18251262cce35d08884d15c
SHA2569c0f4e7714505da475c224535d926e289f934941c63e8eba2ea3318845882584
SHA5123506ec034256810cbada7e7c727a39dcbd25a0f44330130f073ed10d4da1c51ad4b5a611dc5f3ec26f62d866b16d7f99d156eadb04a3b4fc52a0a9b31e2a15cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b614cce62a617c48c1e63e493a1dc6b2
SHA1975930aabd551b7913c98121bbf409738b17bbd4
SHA2562632fa592aba77b4bd8b65d1e1fd890e523a8413fca26bfca4b7fc233f0667d3
SHA512e7242d759289577335c00cd90eb58db398cc105b4780a821ec8ac94ba80e3337b284a9bf02683c5e46b892997508d1bbcb39b637e2c8c841e62d4c1630457e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb38fb530f631c5a200de17c277e3bd5
SHA13bd0cc69d08f2e75cb39026145d16de636fc701b
SHA2567e8865651c1ed88569a09510d74c50de805924f9eee4693c9fe064cf2b489f10
SHA512e9b458321d1ed8890b020f9d745669b0a5d6a9589da602774ea244533547c636db37ff4d52a945d711232abb632b81397191411164c3d6a646558a6c027206fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548247069fe20ec45913e0946b164fa09
SHA176f3c51b2543d6e8a3f28dc7850cb3bae9f8f241
SHA256031d187af027ddecc93b514ba6855aeeb2517d7ef2b522b600134b01e2712408
SHA512fab81ee5775a7c9722ea366cf0328f26d82c6ab2c0f7412e68556aee27df4681e388bbbef4f11e8f766ae0357d95f74f4fa99fcdaf0e2a1938f52bcf1939a915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b8e14563e3ea046aab0ddd343962f52
SHA11c62ec8a63fe01e88fdcb381543c55bb7469b33f
SHA256db2b8da2b4f711e1885e8c84d7f68b8c6bfcc99ba382e243ba44ea0515c926f0
SHA512bdffab4fa792b3c777788a2f3a1214b33c41ad157fb80faf3f24b9ea8cbf5cd9875f6aa89aa833e127b8452532c52adb36189e91a14cb4e2ba1343e128502ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506b425f7d3e466aa3b66e3ff144b9b3e
SHA189302d7e0d489845560eb5ca91c545e9652f9652
SHA2565e9c8d8416869096750311707e7fed6d2fd2818199b2d472de00f6d5f75e29da
SHA512d201e0c6dc9c3622f835872692abbbaaf8fce60240c74f43a909542bde14ba921d39b6461eb08263ce7ff27f9490ce496b6ef99cb46a9bca2cfd64863bb74908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c323babbf490de2e196d20085eec00d
SHA11bba24f9b646219ef3679e0ad9e072d061aadff9
SHA256dabd58ea67aab8fc7fb6900c1a44cf6278626b7ced1f768854888cd081269159
SHA5127e43d685cc094e11804d2504d791f5de9cd92a08c5e0f20e226a90cf779fa4439f33ce46885beb10062e56fe142727578ec5957943aefe4d20ff6264d5938069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599472e14b5e7354bbb3ebdbf16227614
SHA1d032b02b92e56b65c6252ad24658c2ada7b0bb84
SHA256cdd0938903a21a04e92f9c0a7aa3f40f7758c54c0648a7fd2099cb9e5928dbac
SHA5125133c1a1dc581557b5c0adb88f05448387944a92b7638c77602faefc0531ea0c4fe2b2fe495087ff486e552b5fee26495950cda5a65299cb5fd9041ba0178e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7a95b95bc965ab2a6525a9855c09c45
SHA1d5367d8f3c6017eed1c0c96b8f374f3c13f45703
SHA256e29b0c249f2d56797d72da9e92bef1c2db75e83699f26b3a676325406044ce6f
SHA512e9c0bd5405bf50a6211f369cf27daa660006cd970f9f5cfdfbc2b42eae0e1a6bf6ad3793c37dde9e9eceb0224aa41640af0a86971817bd7581958dcbb4dfd605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d304849abda1945545d90fd9e518f19a
SHA1d49fc6c09c20dea25515642b585c646c97134730
SHA2568a53f2c7d0552573a571a11c5aafc7f8e98a22891e9952754e20a45a4a33c7e1
SHA5121bd7af638eb1c2622f735a242c3c7b6cab7af5895f3286a4b3acf6ff83619514d156a6ec2b1987c9777c2dfd20ad03c10affae18bbfe2140f3f739f2c69cc3c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5852b72fb23c3be822f94c9b219f4570a
SHA14c91ab24a10a55af97ab238887f34a8f07ca2b80
SHA25681d1f062aba4d857be98f3574b4fb8a903166c3bf48f73fa327ab98de2caeba1
SHA512192c046c10bdbcd4f28ca2a660cc489ba40c21c49ffb69d3e42b50ccf62efbc5a28ac0c3bd21a6f15cb256202852e4f4e36dc286c017e6358e952807030be581
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06