Analysis
-
max time kernel
119s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 14:36
Static task
static1
Behavioral task
behavioral1
Sample
0172eddbec327171d19b4115344ea43f.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0172eddbec327171d19b4115344ea43f.html
Resource
win10v2004-20231215-en
General
-
Target
0172eddbec327171d19b4115344ea43f.html
-
Size
6KB
-
MD5
0172eddbec327171d19b4115344ea43f
-
SHA1
740623d0422218341cdc57dd6d6e6c3335339c85
-
SHA256
92a646e759f535f7928b23957b6774cd279795cc0c368f62063645747ac3a7ec
-
SHA512
f2362195c42821cef339747abe7ba1656b939d30c0ac7869044ee6fdba39efa2fec11214d4c1a0e97bc88c4140239137e21a2470528596b3c291f7b9a0327f52
-
SSDEEP
96:HKRQuHZl2UUNI65HA/pO1m2moudj7qjYND6KBUEFOYY:M2U6I6lgO1mjoWmjYND6JSOYY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501689f28d36da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409600479" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000170385c117e8054934e819259da92768137b058fa2eff22e6a0ad75154dc545e000000000e8000000002000020000000b16b668197dfbb6ba9507d0a55cecbdfc04c08d28a7a75874e69a3fec1ecef1a2000000070f65f54ecebe489691365862bbfacc3130a880995e923bc951252d771f9ed3040000000482b8a191a9986d422cd5cfbf1a37a25ce5ee1281d990076d08083f1da282cff3381d737d122947a9d4605ff9e47b25873eb76ed04f16ea8f49714048b0f49f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E0FD111-A281-11EE-8CE9-D2016227024C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 700 iexplore.exe 700 iexplore.exe 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 700 wrote to memory of 1252 700 iexplore.exe 28 PID 700 wrote to memory of 1252 700 iexplore.exe 28 PID 700 wrote to memory of 1252 700 iexplore.exe 28 PID 700 wrote to memory of 1252 700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0172eddbec327171d19b4115344ea43f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521942050fc6d65c7acb31e98e1fca94d
SHA1e38aa9dbf76c0f4003ef4aea9cb5cfc627e92642
SHA2567627edf465fb619b75c444676afd09a62ccbf8f6c9977624bf116ca6781ffbd5
SHA5128b35add256e1fe0e291d3fd167d22cfd12c7abb14cd5b0538c12184bb04eb734dd73bc7cab2f923f971fb66d952fbb6ab88b1fcd8dc582b75aa8950c6dde155e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6d58c1f8fd63fa5bea42ca6b936e9df
SHA16477f1257ab08eb2d4578db8ecf48a263a6dc79c
SHA256d653336925f502f1491fe4d24c8e0b995bfb45cff532ddbab3efc0a603f75031
SHA5121f44e2c5ec60d2a9434d06638e891df506f13da1739df89a2725ccff689c715b6bb6c1903e07bd3cbe002ec4d4307bdf563e9c1cb65f1cb4f3fbc760f439fdb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5352bc12ea7489dc511dc09545f74b80b
SHA1fefaff97e64bfeaf1da107555236ea9bb7b73141
SHA256c20a0d661deb97049d66159328e3f813c236016e5222de8fc3317bdd49b51869
SHA512ad98760a96d2ab478a3ea4384d067bc6422450af39fb3e3b417d2ef2fb0537ec4a5040f32bd5c3a91aa2b114d26321ea2a141acf2c587597e85b55fe32842427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5811e900a0797657ae02193412bd95042
SHA1bcbed70f8a88d7cd1e80b510956725640ed4bd91
SHA256f9c94f04ae12a36f61649ba09aba871c8964dd8e0ac446ba578383cda74455ae
SHA51248833383a816238f0897d0dee262f06a7bc0602951ea4b623bdb3853a131a53a138d36f068e836a2d9563b45112531d7dfd3c3f8331b882c07b411fd92acf219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5015a3b499c508cd6dd1ed7e22404c0f1
SHA184f42b6bbd83e28ca2b42c8177f37d4856fff6b3
SHA256de6ee860a52a9e026b81347dd4421f807ffc9a9e4a5729e03582c61c49f53224
SHA512796fada77c15ac72273c77f495c5ad793ed98cc8293439fac1c1ddb723fe638ee5a5f7539119f57d8abe27a6e75ac019e0687a009bbeece60e10838e74a95857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec6fb0491ccd8cebfb969d41eaf6715b
SHA17a9d322aa8b1612207b5fe7f44712b1bc9c77ada
SHA256554bfa49fee0cda1359cc560ec75211a9c224c6c9bc950953d3461cc91e8e50d
SHA5120a2f213e2a2496172c1eddf3190022f7d775e3007c436c50f77252c9e5be710d4e131c5fb3ec5315c7de90898ce65a13ed56dc660104a0711adae202ff3a59e4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06