Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 16:56
Static task
static1
Behavioral task
behavioral1
Sample
06e10233982ed5073a28cd2ccbf2a3af.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06e10233982ed5073a28cd2ccbf2a3af.html
Resource
win10v2004-20231222-en
General
-
Target
06e10233982ed5073a28cd2ccbf2a3af.html
-
Size
53KB
-
MD5
06e10233982ed5073a28cd2ccbf2a3af
-
SHA1
5186533ebe533def259f92a42e195e4a70d92c43
-
SHA256
e9bf76a78f43c86f2b7448e92dac96e10e7bf07c4b5a9700f9486464a4a05a60
-
SHA512
02c06e972e0e67e941fe0ac176dcb682e25f9ffec2a46113c9fc565366925675f68d2dc8f05cd7d81bafe67c9d873619972ba2c367a636f8bf5229acf94ab2cf
-
SSDEEP
1536:CkgUiIakTqGivi+PyUkrunlYU63Nj+q5VyvR0w2AzTICbbkoF/t9M/dNwIUTDmD/:CkgUiIakTqGivi+PyUkrunlYU63Nj+q3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000001bb9009c06ba41c0b787a08c727c39a3ac8e1a35042d45f1007cdaf29b10c24a000000000e8000000002000020000000a9876fc746a89c60a65239bd0b68cf9f1ef9f47900b88fc3531e810436c8984220000000d05998e069a05e54e7b993daed1596863b6892a91203ee6b19952a3717de79eb40000000e067186bc7f474c018a0cd541acb6137fffdebdf389a0f16c3e31ec7cf715dc0d5789a663cd6d499b4d974f498c64e456d8fd0fd5aede4412d2bf140130df8d1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01f570c9e36da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409607340" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{211E5E21-A291-11EE-943A-F6BE0C79E4FA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2712 3028 iexplore.exe 28 PID 3028 wrote to memory of 2712 3028 iexplore.exe 28 PID 3028 wrote to memory of 2712 3028 iexplore.exe 28 PID 3028 wrote to memory of 2712 3028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06e10233982ed5073a28cd2ccbf2a3af.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538871c25696aba0e39c583c848497b35
SHA138f0d67be13fbdf4894cb31daedf44f99bec29e6
SHA25615cdbd0cff1c5dc8674c383814285d0315084be3fea4460b2f480a4c9db6fb38
SHA512e7154cc708185232130507b36c2f4ea020cb1d363489f2e848315eeb664977e8bc28f4c56643256367f441116ab0e08352f66b141f86a69d25136146b0088db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7cc18c2b3aca84b5ebab1beb362083c
SHA16f3a81db0509c05384021069222d5bd1509376c0
SHA25687ca03315b3bd04a6ecc918108d98d582f9c1584f5fdcac6ce38607c9b2e9dd7
SHA512ddd02d0540fce5e9e28ca58ffabc0c90bface689ef58b195e19250171d029798b31f5a175bfe31bad4ffebd9983b23af6235daea387bf36ee9ea4f88a2e894d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de1432fe5ea89f185fd7457d82c80e08
SHA18a25cf854d25cef2ce493f6b896924da746a3867
SHA2565282186a3e254dcbc770b5e359e82e232c081eed292de811fc3269c30cbff2dd
SHA512d8cbd49f2d99737a0e99c1dcc147f3dc8bc1d4a8d885b04c7d8c6a76b153deafb7506056164cfc832f82f313ada633d017075405a672aca2466b732f37708e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df53ef12f66cbf58e5f36cef780e92da
SHA1f8d97a0e0d34f64ebc8e1a772913e163cf4d2b7a
SHA256b1ea8aa116c35396a2fe47c396360a452e17c0907d9847278015feeef5f2322f
SHA5126ae1f47ce93e80f9140fc71d1c8311cbc909eb7a6eca0d124032cb5ee011c3d57d3f0c29609d4d83d997ad5344f7fb953d7dbd431952a7f5e4a97ffcc74087ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5020c840e61f26466b43dd55d6ad64ca9
SHA1441c06818c2b4aba3d90a6ed516ca2a59fa5d47d
SHA2562a5b47526bc4d28afaaa94ee248db9a864975bcb66356cff23a0f7aac3892c20
SHA5125f60fb2fddfd58aecde12bb538bb5bf31445eb2762bfbdbd89e2cb37154863673070cdceb6d28168f3738176dcbc931b46d52491f298180ad4ee10d49446896b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ceb8947655d3d996021eedde8504032
SHA1a5a78371c3fccbbb12541c90dfb36d9004d57ebb
SHA256d568d17bb953f897d6cef1c91a0231d33227ce69e918376095c758055cab498d
SHA51206c7c57f209afacebb2021a346bac74554e66dc9a70f2cd6241dc5c2297c6523457e8fd1d7335867223ec3c3cb224449bd8ebbc5a91ee98d18ea9fe700c5b61f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea50fcf76b2857febe67b07b0c6b44e7
SHA19c90e81da26071783dc0d73cbe516d1df75673bd
SHA25685bc536ed16cfcc51eef57a271e0f5d93f0426b22685cc894a5869cfd732aee1
SHA5121bc43a00b46ed6036488a03a2b881f663493c6d78f03375f50e1e223d62da0b2c2f1854ed71845b5dfff33ffacc910cdb3facb5a017aa8a3882ced3d5a699a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5787e68d0a6ce996391a7ffc38561f95e
SHA1f61fcf6d9368c4446f82674d72627ec1507efc12
SHA256f3028365a8cac07f9f02dac5898ed62781cf7466d9937ac70c90ca10a5ce60c0
SHA5120fa6d12cc27382146cb2a741e68bea1a96e21e0cb97bdaf7d8c00dacc307a94ab80f68eebf65656c2e5c91962dc1cf3a49e59dc4b69d160edaf9963f557d8cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f38cb817e363f6653ff5f10df57b6718
SHA1d69eb33a685a685951cbcf8a2db425c9b0a6795d
SHA2561c6e6143b862276f46d9f59ff1581d4620ff04dbbf15178762814e90370c96be
SHA512fa486a3b0d56b22bb2ecc7e8d3ac3bd9ea7edcf648358c6577a0b008fa27453a92d2a59bfe7fced32b2bebcf06c263891aba90576071ecce5d57e7df5e51c6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5674b03c4781e599a208cfe559fd4620d
SHA13c008cf0493677522812f17a00f96e303f1ddf8f
SHA256b9a85be3014f48a55b762c41a511ba3ab66937e440e5a76a06cf443314e33172
SHA5129b3451afe29b4f4e24aa6f2e6a305efc30eff5c15f23afbb1d2634dd9818a7bfbbd5b17a3c412cfc93d6a30589a047e23cdaa0691845d3038d4cb68ec3684297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528dacd7d2e23048d2e21350e7ac658d4
SHA1fb7d651722ecacf067d801594ffe0628efecb923
SHA256a58e11a2304eb0e00d1f5f287bdba8a707167f5156a36e43513896b3ec25db2b
SHA5120f861902a3d22bacd7015919c230019d670842b13be4ed6f6465e49dc28952f9e150a11d34db51cb1190835374026c15463aa90b4453155756f49cc9c5755d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f02fcf499ca0578870d751d773efad0
SHA1890be40418af37a022a18d35841f92aeb07b0107
SHA2567235cdf8f6cef803b9c1d6bc6744ba9c4b11e679da267d9d8484b135a80c902b
SHA5121b63c2365ea3e693d791cd2d550e6f20f3851dff2d7315406d0382420d4578fe17b615e6e1af7ae0767211502292a566ce05ab5abc7dfd68c372df197dbfb2fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c186510944f51ad7ed8bf020f4681583
SHA1295e1e8355f78d0e0056e68711dc4e72726a6375
SHA25646c3ebc1ea1a10cfaf4431340291eb930578b75ddc034226eb453fedb3d6ccd5
SHA5129e8399dab6e507e56e0f745e9621ce46eeca7d202ed4d3fb5567f205a2905d5a75faf6ad707a09ab4ed92de24d5f72e99d247f62c1024f765bd40d003f754742
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06