Analysis
-
max time kernel
143s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
06eb2b7c428a9544d5d0d3dedc569f43.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06eb2b7c428a9544d5d0d3dedc569f43.html
Resource
win10v2004-20231215-en
General
-
Target
06eb2b7c428a9544d5d0d3dedc569f43.html
-
Size
9KB
-
MD5
06eb2b7c428a9544d5d0d3dedc569f43
-
SHA1
5a2775452aa5ffdb9ff1d6c8abba1f65c562084b
-
SHA256
789ef9a46767bc0d9a748d45feb81d7bc38abc34836038318bf25e689d24fa86
-
SHA512
ff369163340b2407c4bdbb7c775aa305c893a62c3e0602d3ae722dc2ff01e0ee880a0417eef53cbc30588739a9ea042d21cd54f8c39bdcc0f59f32daf85e76f5
-
SSDEEP
192:uUJ/28hAK89FbombocblpPR9HId45tT/frNH7BDC+POfIfjDNNscFkJOcWf0cYel:LFhSFjZ9HId45tT/frNH7BDC+POfIfj7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408ed5329e36da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000009bd7c426d0cdbaf87b304731022c4a96ea7c22c2f4c8dd6bfb9cc44fdaabbdd3000000000e80000000020000200000005cab0a7cb200847e1e8558cf7596a692aab5776e535c9b9e34328e1c340bfa632000000036abc90f6fb22f60ac030af09746040f1cec0188942735cdbde7d90831f6b83e4000000077bd7636152ba4d141282f46db7725ab6c6810761caa7dd003844679e1e4b7ba0cae76389f0615ea85bbe259cec68f6cf485e8a8e2ac9b416edcd2bb57afb55f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43986AE1-A291-11EE-97FC-EE5B2FF970AA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409607405" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2696 2400 iexplore.exe 28 PID 2400 wrote to memory of 2696 2400 iexplore.exe 28 PID 2400 wrote to memory of 2696 2400 iexplore.exe 28 PID 2400 wrote to memory of 2696 2400 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06eb2b7c428a9544d5d0d3dedc569f43.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d3113ce8d943f9e75b4b6be27f5b0b6
SHA1654cd43f2fea2d90455020b8070c6a5de3039052
SHA256d700c88be8832f0c219e3abeb9b11106dfa4b876e9fdd6fb17366261af6b2424
SHA51285896824db8f204248b8c1d69f95d7e1c7fbe6ce67f020e544bf0d2452887d89d68370e98939cb8a4405d1d12da6927aff0bbf8a52ec53aed1a709e051ad3d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f61a03f15163630e3596b3976ca21006
SHA1149b5abd8ba4a6edee0dcb867d41af9da66f0a6f
SHA256219a166ac9fde5fdab1669849ff0c0e0937f629d422e5004daf0f8046f644541
SHA5127aa8d38041b63915fe0a609e4609c714dd72b2ddb29c0290fc0b0d208b5411a41f81ae319e605c24255099c19b810ea656a9ff9d60269466aeda203fa59e09d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a9ac105d7612f5e86817de830db5f9a
SHA1f295714dc0e078b39e2b21bbd79fd75ba5be6ade
SHA256020b156db14b45c49c88aa2f4670c8377bfb75a7d94b2cbf7bdffadff3faa350
SHA5124ecc69643049252bc002da64479d88a7a7323aa134070ade43e1a91b3b9535fa1dfda73d576a1e72da5e4636f17ea8a34c3b6747c33375146d45c357d8b03ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f66787e9ad4112cbb87965eb83467ca
SHA13f9962c63d06b1810a7f77fff8abdfc7b7e82536
SHA256debc4c3f6fdb1ffe6fc9de0bf5359e4fd2d8d837935a829b11bc7afd843ee270
SHA51252040f8a409dd33af2caa91a5d78e88a1f1c558cfbab38627f04894da73def63dd4b414e4327c1768a4b0b063205abcd6e53a98b66ce13c8cf0342a31a031800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5811cef852ee686e0785eb871412a82e1
SHA1379bf65274ad1a25120200c1259437b07a7c6bc3
SHA2562175dcd42529fd38a236ed1b8fd96ef1cb04910724749b072e829ad183f809a1
SHA512bf43e4630267f3af4b2f627d3e603d42f993a3d3ce0ed9e307d0700d688bdad6b7287869a22bf8627b1b75d61808ba9068b56156be1a0bce6e7a6855320ef479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc7d56aed923d06973a117f68fcf3c80
SHA1dd9150dce8d88c3a4bdaffeba40c08f4dab102f5
SHA25671ba0d670f4a6a7758d3ef6fb7ecf9571b0c89a0e4201014323a03725e6c74eb
SHA51206a14e8d5fcd7a56efe7f3f0bcd1c9c5f1c88da71e067c2708d79407aaa2b64ab69a953eaf7e9a5f0a409667ecfe2e62417e9449ee337b91d9015056dc4553e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a899faabdec88761c2b3706c0852a720
SHA147613f5a1bf76ae90a354dc643ab52d76db7ac44
SHA256f439c7d5ff0d61753088145eb964e3decee41c36949833e772a8ee3790fadeb4
SHA5121ff08290d81202c2ee50662ad514994e7b7c204e49a6ae2c5bd72fd0f832476ffe9a2dcd2715eaa8b0e3bf9a89ce5b191634be4ca609bbbfc50d9eef7043d234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a983f14aeaf84459ae29bbe55f8964bd
SHA1eae8ece525003c0227f8ed7c02ec43e45e677847
SHA2567b2497b6ded6aa2c185cfeb96841b8ceee28f564df9006b2815d1638e20236c8
SHA5129fe941a3fe8387664c9577ad01f96625350698dfae00336a2798459291bdf8b26b477b400cc0dadfd79d734b901242087a4578546632b4618e986cb9ed0f595b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50393e338d18e3fa7baf627ca66eb24b2
SHA175ed0aaec23a93276a0504486c32818a59c3d922
SHA256affe216a9b7d8af9a86ff1b69b1eb76099087a412fd2014bebf48f598ac52867
SHA512e1a3fa10fa4dfd2b9e532ca282307c77c42ae48e7988e4f7387635984e0743e9c10257fe2c137c599ece0eb5761aa593e5043791d2841d18dff4a35fae8e1b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596419b1bf2ed9644c86119c23ce4f86e
SHA1375976b518825b700267f2869a1a69d709535b4d
SHA256c5ebc2aee46de5a282cafebe530a1797c35a9137e026d9cf9638e13d0be9d79a
SHA512db0ff6c532a072e56e0cfa86cff60f3907ed773504f5fa12fa4ac24c60f0ff832b67410caa79694af7a42d324f435a422c14ff11909314e442faa112cfe145db
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06