Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
0943543cc5f41877cd3fa53cc6d13883.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0943543cc5f41877cd3fa53cc6d13883.html
Resource
win10v2004-20231215-en
General
-
Target
0943543cc5f41877cd3fa53cc6d13883.html
-
Size
106KB
-
MD5
0943543cc5f41877cd3fa53cc6d13883
-
SHA1
c81ef09c38be1bc551dbee4494bb69492041fe72
-
SHA256
e51bcd62bfe5d793c396c8b1db1dc885e1cc7407add37ff664c07d4597281c8d
-
SHA512
dab17ef3c22e035354630f4259744c5134e1203d28d5d69f9385b610ce38c345005870fbff781ac1c88250b2275d8307e500df38f1bb8f32d386203e38dc4ad4
-
SSDEEP
1536:wlCYKs3aIDm00+uQ8WVd3UUaf8kcXDUafy2tGUafeOJU:wslY9Vf7DkUaf8XXDUafyQGUafeUU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8E25051-A2DD-11EE-9B8E-42DF7B237CB2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409640320" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2412 2236 iexplore.exe 28 PID 2236 wrote to memory of 2412 2236 iexplore.exe 28 PID 2236 wrote to memory of 2412 2236 iexplore.exe 28 PID 2236 wrote to memory of 2412 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0943543cc5f41877cd3fa53cc6d13883.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f38eb90c446edb0f5eefd4e72a874b72
SHA17e18273ad1a5ee3be5511ca7089351e69bf0d856
SHA25628dfc38a8b866e4edaaf216ea783066b14470b6164a3427d0f172cd0d8043493
SHA5122497f50fb3c98710e4be3d188543baedeeed1895cf62d1dcc9dde80f3c925048cfecaac0d34564b0397626334799f45b782aeb70b2638d87c957dfce57fb8fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59384331e657d50aeadcda8fea853b1fa
SHA1f315569d9907ee7d563d9f9b5dc02a03affdb8dc
SHA2564b12d05e8f02ef2dccce776db068fdbe7e53cff7354d9adbaa87ec2e7519aeb6
SHA512ffde40c3a281348415ec8f50edc9c4fee25a810abdb4b9985a50735a887f083bc284e491573d8d9a9bf665a8ce54f387450d20029ace8da844d75bd9ecf992b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543118ed677f23c1ea8e519243db2bd98
SHA1bf8c26c1828ec697b7bdad0ac010e26a66b25a6d
SHA2561e40012b7dab0b200f87773940bdd2a71b7f3632dbe52900bf1c009f7bf623f1
SHA512401f11c2d3367e2ef8efe3213bc794bbf287c9dfec601735f7afc8ba822e6957f6dc520216b4820c12f4ce4a82edadf3680f071380abae37ffa4f287a6b456cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543de208094534fbc09b83ab2ecce742f
SHA1268348d55fd282f2cc33169c560273c53f83649e
SHA2568f53a5ea3455358935024ec4b9abace25e7f37de1746e366c083f62bc7d1e092
SHA5124ae03e9f309f45af00afd17253f0cb2e2c608fcc0dd0c60a32a075a4cf3eccedae5b4c7f5279d457f2c7be1ef3acf6ad6a8c38cda4bc73aebb94861c2aca427d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ab2873bd882f2b1772784142b8df25e
SHA116c49c9987320c2ac899ecdc84f4a1dc210d911c
SHA256aa98e0e07b86420e629e1ca0d60e53d97e0f1abe7ebf562f6fd1368b92fd84c7
SHA51209c7f4cf43059f68f1c3e7b2f2d8ddbb877e41bd60e859536c8fa94304daca81333ff5e8dfa757a432463c657c4477a83aabded84d2c6a8328035c8d789808e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cac4a81269c6a14d449c2e558b10013
SHA1ee1297124a0321ffd16a9363ac95f1f481564dd6
SHA256af9c8c708d6cbb811e131fec386bf5b2710be0c1908972798b6f9d6edc9c49f4
SHA51254c1ec108929394b85764ccb5ba2cdd30d944d06bfd98790cf28fe186d80b9451b2c9b16287b4e8500a6176a2c7bd545d6b5ab3e1723dba0f7a2e70c7f7bbd9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574384a0c70b81f69071fb86b2df83961
SHA18d99dff02e6effcd4e907e756508f5a595d7aea4
SHA2566695c0a5e7f5ae3c98352be7baa78aee27d50de7886133e2a85e18c7631676fb
SHA512b8d3528d89041bb896f9304583f550e8d2dab03fd66b330fb703217ea6a98714b4eee9aa8ecce1a5ce558d789e3c848b3e47ce876fa4ec02020130b145a5734e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee8b4a788e6657a6a533b63dcc752e03
SHA10577485e22f027aaab4873cbafab0c241be6e1b4
SHA2566be42ef36c1bdca29810e7699509cffe56b2d6b20aaf1a7f7b8d1b2e0f284898
SHA512f02b0953ce9e1318b61fc7fe2a6e859e12fc986361daa9243a1ccc0f13629171c57c634b5647590190de991cbee42ae4043bc1cc21fa2b11a967a688652da996
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06