Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
0d0e5fe72fdbc52260c32f747d7efc79.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d0e5fe72fdbc52260c32f747d7efc79.html
Resource
win10v2004-20231215-en
General
-
Target
0d0e5fe72fdbc52260c32f747d7efc79.html
-
Size
53KB
-
MD5
0d0e5fe72fdbc52260c32f747d7efc79
-
SHA1
ab4f1ee1bb9afd4313cbe1f0442bee4ca0e9abb0
-
SHA256
e68559b151c1f3a346903702754a5edf78ccad34f10aecc8ebd13af51bb501ba
-
SHA512
4b2d777ffc63637c3f532997ae94b09af7a5b200168052e7638ec61ecb7f383a84a27da4a1124fd85a9fcbc47eb85de7f78e1da93f43562b175932b637d88088
-
SSDEEP
1536:CkgUiIakTqGivi+PyUorunlYBo63Nj+q5VyvR0w2AzTICbbvo68/t9M/dNwIUTDq:CkgUiIakTqGivi+PyUorunlYC63Nj+qI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000d5a7ce5e5e69d4d811028ca9e8084494f1a4569ee6f3bd927c7798caffade454000000000e8000000002000020000000fdf66f1c6c998acc613d61ec4df2d445f6a022caeb26be8ed466c5c0ccf690cd20000000732547a74e5cc07b9a5ebc3fd148fe2c84e6c575067405aaf78dc04bf9ff126240000000c122fcaa93978adda45d5d60a546e2cf06b4e9e4d55f247722136b98d983e970356917c767d3ad4ce8cbc834d85d7579de9c6fad65963f85cd84926c81846fe5 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000e4958acb84f4f99d9924f231e091f2196346f1f2635e38dda2a11f9230d0df01000000000e80000000020000200000000dedbe54fd239e24654da54344883666b508a69293952a37cc9bbaf3fd00e0ee90000000eae41661674f908e9035095978195ba6ff81438ee327a4ef79ec9bb451cd82b5b4ed6e879d02a54ef2654f0ba9c461045d4f4443a199cb05b15fbf456b4171b1239eb74a1fcdd674c43fb214ad2ae4f05613c7e3ef089488129198be7beb0c4f4fab5e0d0fcc19c87b5d846acb8f1a1d8a67029dd7488bff077e20ad96485e48f8830cc03947ee1bae63fea6f97ff4c9400000001cc61359bda956cb1ec74a790f5543cecf3e0f62ac75a6f79b0ae40aff19da11811ceac679df7dd9b647c1e79736ec70edb5809ee64550ee5dbcfa033d5d9efe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409620458" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8234BB1-A2AF-11EE-8AED-E6629DF8543F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f3c894bc36da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2700 2964 iexplore.exe 28 PID 2964 wrote to memory of 2700 2964 iexplore.exe 28 PID 2964 wrote to memory of 2700 2964 iexplore.exe 28 PID 2964 wrote to memory of 2700 2964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d0e5fe72fdbc52260c32f747d7efc79.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b166619886c995fcc73f59e39097f8f7
SHA1f2bb433c9a701fff7bc44ca9ec1682731fe51628
SHA2561c58643d588835322677ea34940bbbd874da5227714097348f0841a9c447c2d5
SHA512f82ca8747142ccbfc212ccc337b836eda2a9785a65d5d74d162d78abc9bb77df0c5bd54993fce46da84030762f83776c79c508113ed0ae2bb3be11078cdadd50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594fafdcdfd31412638827d97b96cbc3c
SHA17c635398a2f7b0b0d252025f4935fa43e80da68a
SHA2560f5ead12b4f1c38fedb33ff10cb9cfd0b19387213d978bdb89fb1f5ade159542
SHA512fb746cd987496cf910a30fb5fa8534be970a9bd481bfd3b7040f398532765e35d2362f86428750dfd3b9babe7903afe3f0d970ae6e8ad92ae458007c797e517a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eec7c8e3712b637fd2abbedcb2b785f
SHA122c1708842b4f8d5029282e8b35d77ade42efe25
SHA256660aee9ab3f154d9e79975d189027afedf3efa101b26d66b495253dfad198c65
SHA51255182dafecb53a06d047a3312028cbc9874728d79fe9b3468eb097a36f4262757814f318164fb6253e5b6b6bbb59e78463abc656ef1f6de43ad2a54787647fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59980a53554c398acb7f6eca253e1a21d
SHA1118bf48ba146c1307f877a28c378336dff267270
SHA256aae26604d5ff636fb4586ac96dadac89bcc51239e6e5bd803f96bdba580a846f
SHA5123a1b5009152bc06cb2dd74df76684a97b24b7bb42ecd5ac6980baafbca5a206fec613180715175cc3eb3c2dc2832b43a23cffd929b337db009074c88b549c4d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7afb3acf0ef1527275004a0b44de17e
SHA1b11c5b766e4edaa1d3c0c2bb2da9e279e07d2f36
SHA256816528d164caba36a89e566bc09432c5e09a72e2ea27fd8b25b0a41cc8c8afac
SHA512e5583bc678e1db8e82f6ab749bba25b0effadf123e175f727fe71f417c8a7ba16404453c52d4babf9c39941088f2fbd47c3f650028e26e6fcc85e9df52df6923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5571314ec0409257a145d69b50597357d
SHA145adb3cff1ca090e736eaf25122e946a8eb1a408
SHA25612c1a616a5d51db82f6e787fed311beb3f98b63ab2d65b9c10dc4b5d44c85862
SHA51223e3eda3e4fd760b1b573ee22d84e5f934263a7bd0b2ea09a924e3e88fd3bf5ab2f73bc0fab8e07bfbf9888b4d81b62a3d62d30ea9aba8ff6680bcf2149a1876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54756ab4cc7cd9edb5dcbd99969764f76
SHA1533ae0d47ba5c0ba6f323c335be43ab7fa536112
SHA256a95ac540f6e2a389d346f965e59498a8a3c9120b5f2eb9c5a5bca7707d399642
SHA512546539d9f138885badf74b520238076d2927a54961933eb4591104506d9291d8fba46641568de803b5acb6a7903d70bfaddca94660f4c5a9830f48f13d9cb143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8fa69f43f9a68c95848cb8c31bfdb9f
SHA14f3846e8587a30b743dfe1a294bfee8bd14cf441
SHA2568fabc6ef6177fdce549c9d87a3636dab2dc6fe958045765457b28910eab19f16
SHA512ab6803d3f3ad94e5d4da58d8e13cd33fa815ee06239126881440876010fb07168e3ae769b6445a7de136bf67fa1b70af665831bd7b9b3aa321e2ce0eecea9312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51808b65deb6dec57a5a83efe74a0e366
SHA105032ce6f7fe70ccd5a3eb0774574ad6099fd7e3
SHA256aa9b42f8fc7b994d6d74a7f667af9168ed27392bd43c379fd391a05fefd78e71
SHA512370cf97217032c624c65719ada962dc5b9a16050c20033301eaf185cd2fd4ae9a01a1206b359cb0c5cdd530ae152ea77f9447499abddeb01a466019250989eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd83b2192038eea9fe455f5fda9b7542
SHA171d60b714b1fce266ae930a166d103cda73bfe53
SHA2563210d60a1b7f580b64977d4a63b2f920507cebb9de4f535ef775323601abebcd
SHA51254c43c5aae2ada6457ed76e6c5b0425173af0e47ec3469ebea4d1eaf3148381577f1e296c962afcc60581c83ad0319d47238f053e4aea278177e2c28073e3ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ba71f5cf1f1ea36baa2f9934ff4c980
SHA15e124082e365d55aa163ef57f5f4c28feb7310ed
SHA256313dc3ffe8388f3eb6b62eebe0699c596bb503f137575cef01876b3ef7ea7e39
SHA5128266e691efb25232e33bc35a809d7676145f0af48a158355f161498c622e6c3aef696f84d8da57edbd76e38e9f1994bd2c8f47a57c0f179ba392bbce5ba618cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed09bd36f268969bf9c34439875a3f2d
SHA17a3b6e018088efe734d8302513f5e88419aa5892
SHA256cef9d7c1b3ad92af8192fb8f38a1bb6674990ddfa7659c8d16f435468990fa7b
SHA512ced86e5e03f8770eb235863ebd690e5df0953f82b820e15af807fb8b134c9657a3b429e588984028459c3c8cffaacb316518da0f0b0f6a515e49c4d36e7353e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501fc8e17fe86e863155815f089011b80
SHA18aad49d0344233351fab9289d95aac1598438d1a
SHA2561cb6f8573a2b523b0c2e68a2f243df6e8c5614b0f1a7ef4204c5c8528de7420f
SHA512c1d59eab01dd4be8b8ad491f9446326e130fbb64e2081f85dd6a54fd658316f667b6fa3fc5ebb808f5bfbd854d595f914974ae030d96a5fd1f1933c2a4a9b86c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518ae997692e5c8132c3e874aba53b545
SHA1f8a0e0d94bdb5898205cd50dd670a52572e88ce8
SHA2562f3185ada20d54f125e4e4537afc7b07adbe82f90ecaab0b75d512cca2e11215
SHA512f94e7851bb908bab6796d9dcaaa28343a60b32fe40e39207c1eb0bb798d424002469268e0b985e5ede4853016e4212b2f65fb6e87e546143d76cb80cd7575b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d30c8e410b81cfd4221a4b309be5b3bc
SHA143bf312f29a86e53458967073227e6c97fd8c5e6
SHA25679f28f9df9e4cf73c1e496abe455cfc04a0e862ecb7c270d970dcce2dfce8330
SHA512e0a4d60dc61be311010f208960c2a3c0ceb5a8d0d99aa8ac8fb5d2238cac95be801ac775c1b41cf6e10a909ffc657256af057edf602e2e1c7fa8c0505a27fc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565343f897aa0c70301746c12bbe03e57
SHA1a19f4e0e9f076bf31d6bbc61de23e1192de49941
SHA256f97958d430beae9527b8207629ff49ddc2f361a53a6eb493eb2e1408ee70a795
SHA512d6465fa85e33185fcfb530f61bb76d18d0f77a661515ff43bb75e64570e249b27e55476b69bdd71c6efee351bfbc1a00fc4e9203d38076e2444f90167d29988b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c851e2f39273015b21914bbc81ab4ce
SHA1d7fb37b13ec0ad29501cf5144ec82305d6501b4b
SHA256578490c6b9216a46b464ce0a051e374f47d5e901701212e104f82859f4213735
SHA512a47d5519f488590f6d1d35cfc2e6298b16d698b4d4ea58fbc0c935e38536aa31ee726c4891467f13b2f0d058478016901c8f180f412f7d63749242cf1b17c1d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fa8e42cefabf6a986f0906e0da5f82e
SHA1cac30ad4c1294c7825e85262f38f934b04f47f78
SHA256794c4155dfa810f6f7aecc47dbf558adad30c854a0e7cb14d014ec5f1f2c86d4
SHA512ac255b0ee8d6592d9ea032b2117bad2b4a1fca14087a7d46093ded1ceb177da5549fe5206338a010a703e93863e19948b95cc7d2a45637668ba5201a41ca444f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06