Analysis
-
max time kernel
72s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
0699d88bcb44b7459113b018d0d41572.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0699d88bcb44b7459113b018d0d41572.html
Resource
win10v2004-20231222-en
General
-
Target
0699d88bcb44b7459113b018d0d41572.html
-
Size
53KB
-
MD5
0699d88bcb44b7459113b018d0d41572
-
SHA1
8aa65ac49c7f3b721a7d44b8b3adf630b025580e
-
SHA256
e6ebebee5ba9342f09d2cff3cc12f2ea17cc9437e2c5797a006c3b28627a70f0
-
SHA512
d5d2e0793f42bc185f1545626a03c7873135ff9579c2e1995d415c3663b15bb8a1f3208dd5b3aa255a268c14c682c3b3b8f9e968228d34fcc256c65171261049
-
SSDEEP
1536:CkgUiIakTqGivi+PyUyrunlYi63Nj+q5VyvR0w2AzTICbbWoT/t9M/dNwIUTDmDr:CkgUiIakTqGivi+PyUyrunlYi63Nj+q/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d78000000000200000000001066000000010000200000006fc102d77e27947624b6117b444377b14160f044827766832a2989cf5e57c67c000000000e800000000200002000000014511524ceeb73ec8d7dec3fa8bed3dd161792e329f1aeb5ec9ca3b7ae7fbfe6200000009757e77ce4e44fd004671b656ab6580459ecf76311276fb6dcc6d986d163f5ba400000002e6adca53b3aaa64657851bb776ba2929fa6e2abeb77d6a9b2c03328f753f610d44942031231d23a9c20843e775ce2580c23674684bea35270984ff68cbe9707 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d0af659c36da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7CCD6291-A28F-11EE-B69B-6AA5205CD920} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1368 iexplore.exe 1368 iexplore.exe 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1344 1368 iexplore.exe 17 PID 1368 wrote to memory of 1344 1368 iexplore.exe 17 PID 1368 wrote to memory of 1344 1368 iexplore.exe 17 PID 1368 wrote to memory of 1344 1368 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0699d88bcb44b7459113b018d0d41572.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD561157b0383542a02c37c4f055ad49f6f
SHA199ce804e33a07ad5f352fe5167b2ce408234300f
SHA256c816437f0e8b62082423ddb5d9ce2f5f13c00385327f2baee35fc6cdd27173e7
SHA512d5932d3d7d6292edcec24b878d3fc570f341771f5a0efd36832213d8fb3379f0ae07ec15e9313ffc863fb9c3e0ea3701508f637d0838e45c226508f346eb2efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af330917a3e0f7ea610da62892ab13ff
SHA169c208cca4f1d869aeaac4e1296b57d5b0dc6041
SHA256abf0c18784b3bdee718bff45b6d646a973a808c395566fcabd623ffdba415335
SHA512bffea1632697b02529efd88d00d251efb64a79d27382168133a708d8240378bf13de26af8803fe8e05c3fe9614f9cd29308fe80f7a337e175cda9a8ba441b42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da09db7ddb84f5165d7317ba80e2e68c
SHA195e210782ab65567e861d904fef81c9e6f5e9f7f
SHA25663513f224b8a75cad456bb5140a9da6b49215a0f857db26e1bf4d36aa8b0c190
SHA512229bc1d14b5539264bc63d13377b150bd920e3036f9eb54fbb63570c1994aa77d0c74b2009ba3a0cf1f8922ff2dfa878299c2f0ac0c34fc5102e187033c30230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55500c5afa92cf6070762cae7fb0901c9
SHA149b2798462fb866a4cee240f7118e43c9ab5553a
SHA256a71143c96e9ba483e49fcd7c09cce5e0ca2d58fea72cfdd170f51def39ede4b9
SHA5123756b2d0f530621c844540d6610667c9f9cefcf38a8b3803428332de97414344e07ffb96b38a5072beb44fbe803ade120337c1faddfa90b92848ba04095eda0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ef717c2d79fa78aaf8b91a286c8b649
SHA148ef1ad25dbf69718fbd94dc482a65ee3f7daef7
SHA2567a2287adb1ac79fa5a9ed1130079f3fd1e71db21c698775e4316967ada63591a
SHA512683f1d6f7cd9351de7e27a2789e1bbcdd17b4d29c815469cfd7fa80d74b6a1890519ffdbcdbabd92d32d09c5b7ee05188d17f29935a0c529de3a2f141332b673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7892a414271f3397563695016cd6619
SHA1fdaefd71429431bc18a853f9a46d920d66ff442a
SHA256e2d62cab76c3e13affab5c798c22189c31cae8e82c4fec975aceccbe6466ac2c
SHA512152b3874de5b259025e246206754304a850f67f35f650a092cb87c235b255dbe3c2221e1befa956a27dd5adf83f08f0a720d6ae87b4e452189f5105406491dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f88118ae2602f16b130be999ac0694
SHA1dab51c10aeaf49825731d43161e7e3fd06e4aee7
SHA256881df1e2197630d01685a8aefdea481b01444e18b382c6d63bc18680b2dd534c
SHA51257c8124b8c529ec6ba7ec3e76aa86639e471d933729af99a01f8a6a4390deec14f1e5189c1650d6046a15535dfcd84d76dee09fe1c41f1b9f54e539bbff71d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6d35d99167ea7c5ef3a04e92e45749c
SHA13d4d2a44e16d7bbc098ad0e9cbf18d9da038cf3b
SHA25620fc809bb01ba684ddedbcf056f50626e86ede8bece0f63ec9b6388018a59e55
SHA512e502cb7a60ec95f70a1cd45b65e5b0eb68074d97bcdccc513e12eb17170012aa3bbf6d80604a31878d1687b9c44b74613386d57bbfb44c93f47f3ea260423d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d03d89c8aa69c26e916908b92dd6811
SHA12ac2c8712bc432e890cb2a8b65c1fd528523889b
SHA256b3fcad7342feedace46081d1ce6612c98250f461f68bd139c6a73a4d9291c43f
SHA512e57155bb152eaad350b73b98f2ff67a4ae2ef270590105058c2f47d3983bc340ad49a6ffe35a040d5eb3bce8d8447c701bd5dba16533b7ae0915a2ce1de6de30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56664c00fb3dabc92db2bc95dc47308de
SHA1f6908d344aafb38df640639fc4322ff5c9835705
SHA256208e56bfe2b0c2c2e19552346685db8e40495b40727c9e0fa42885ff45d7b10e
SHA5129d2c257e1186f6f4bf14435f86e884344bdd6d25e4db6fb977011c2f149a00c35b5f1112da5160812f8cc54281101e395e9f908603cfa194486e36c0cad9e94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5491abfecd8347c4161b43bee0091a2bc
SHA1bfb5b97b14303dd03b30848bce1ba45e26a766fa
SHA256883a0c499536fcfa9691de829f0195a54c04a1759583893026086d1ab43e1a67
SHA51201d4dae7b908fc1951300266d1aa31d2fb387d5b9bae8851561771b6b92a5773ee7c1a510f0b088b35214e9a8b6209c852d1b4b67eea05e5cc35f38395db85d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\07AM4OAG\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06