Analysis
-
max time kernel
117s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
0e68a8afe3dfe4e68a51befce275340d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e68a8afe3dfe4e68a51befce275340d.html
Resource
win10v2004-20231215-en
General
-
Target
0e68a8afe3dfe4e68a51befce275340d.html
-
Size
3KB
-
MD5
0e68a8afe3dfe4e68a51befce275340d
-
SHA1
005df2304dc2008d2af569a1f24ca77c36274f67
-
SHA256
27b0dd19f927486f4ee942190927de89adb120d49a175a8e147e0fe9f57eed38
-
SHA512
255f0efdb178889563f107481de39caf963e91375456d8d318bfb3b52a3c866c08483a2f69cabc456fd69b7e9678fe22281ed49b465b922d492e1aff58781c23
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F826AC51-A319-11EE-868E-CA8D9A91D956} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000009e964c56269ed7a03c26cf82e162bab10a8f11bc7f66794e4564e5c5c015e93f000000000e8000000002000020000000591b85e0ee8aad42f654c152b53127ff65591cd4ba95754e839bc21305dec631200000004771d39af0b932334766cdb5951d8cb1045b608b9d7b719540191fd1cf01244f40000000facaa8ec660b6483be4f08ae0688ae0b3b05ade46566401adffe0d1662beb6e6ac5a559579d199ff2b45b0e783bdee3009907328212558b96d570fb9c30c826b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409666112" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9016bad82637da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1220 iexplore.exe 1220 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2648 1220 iexplore.exe 28 PID 1220 wrote to memory of 2648 1220 iexplore.exe 28 PID 1220 wrote to memory of 2648 1220 iexplore.exe 28 PID 1220 wrote to memory of 2648 1220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e68a8afe3dfe4e68a51befce275340d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5936653e43cedbf01c8164394e4f2c740
SHA1dd33187f537f034df70a99179e7232f29db6a071
SHA2564c76435d421786f8e0073f0f22dadf88fbc3fb6b4bc6a6390f9596e9f4107cc9
SHA512cbe2d6f3b7ffb7ec0173c8fd764c4033127daa37dcb45d9ad81bd63ed16453fedc4933317dc57d0d2f2583004e02d8a30b10c9194b6c6271e914019e8849694e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6c351f49c171afeb83dcda7151fa63b
SHA1fe7d740e6438687765e4efb88a1a58a58ea06d85
SHA256815bf65cb9e17738a6137af647e5f33b4cc2c01fd290754694fcbc7bd383adac
SHA5126fa0987a20a3dd2262df826da8b3b0dd5ac2fc39f6e76544075641d7f312ba7dfab2a0e8071dba24cf9b7bcb91de778688f990c44144a83463d8f08e227b3bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b6d4499a8ea988c9a89ec8389689e1f
SHA11fd9d6eb83c2665429500c1d3db7c3da2728f6ff
SHA256c7af4c1ee0d1e4deb0b13f8604ba33d420ca12c34d2feffafd97bac9da4103d0
SHA5126dee04591777cbdfe74d798cd8a326cb7115c29cfdd66a54876d434b08df6c4b2cbadd91e1a1dbd2ae314c06296dddca5441b3729994c8f9f0b162a59022047c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbda94ea07a42943cf88cea481658cbb
SHA1febbf5f25cdd2a630821eb059e7095f8f02ecf66
SHA2560f1af73b812dbadd281df93f8e2d918e59dc9b3debba391f70468d5aae4a2a59
SHA5123d291a27e34592b42555808ef7531be7542cf0f4bc5d4ed2ef4f75fc5bef804c8861a64dad299027fc33034ef797d2db36a8314509957da48e10cbd4035dc054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb732e444a876ffbdcaf0e23fd6427b6
SHA1dc7d2ccee56f206b52ecc7a0b3aa05884810906f
SHA2565d1191cd4c76953d498a769eb06f76d806c3d5a3096e054fbdfadd00519ed6c8
SHA5126cde91f53ddb96c5e553da88f4cfc56e1be0735d1fadc6899f25fc7970c972280599baa211cd30f215ddc93407880890e0e16fde2edeffd16e306ac35b501950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5657955d6dc59b247ddac16b970a7b682
SHA159bb9e9ecabbb757de65f79b8509543414e75c4a
SHA25625c0a9f15c00cb9fd8f4044129380df483513f5d6218590a8825a2d5b1666dcf
SHA5124ffb127f572472cf3159e3e493c59151d3344722cbaad3aa892542abea1bc18a2bc0fdab00156f95e4d6f9cae8afac8dc50321633630f6f579dd4c4b85fc7f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5453edad5ecf10fd7262d655f7038c97c
SHA112b9ef648ca099eaa73c90ab85d7c7d2bacf6996
SHA256fb9c77a3e5f6cf9a9d132c1d3349bb484e1e49c123d463f93a8ebe1b9c5b582c
SHA512554c066c66af21a71f5964c0a5a836631f5c05b0f2dd4137613c0b487137c4973bdf85535f08b79d81359bd12c3a0796dd2df40d4f8271bd0d3913755cbc4a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dd21459f5da2e7576b19f0b0f8c7333
SHA1f4a3507d499284b887e9fd5cfa25191bb4f4ffdf
SHA256514225b0a47a31b5f98f61421a9856acfc5461907d2e24b6edee77b677db769d
SHA5120d1cd9454545364be77f230e444e2240361f051d4532331e2223435fa2361e6e2d6081aa48cde6edb4477e8925db9d27d07982b6b229d51e5ac242bfc2e5226a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b170c491cf954d437e08e71bc0379e81
SHA16f9b703bdfdba2317d0f36123c704d59f4d1caa4
SHA256a2675eb32fd21da43a0c7440c8b3007c95a354d4627dbdec2294e7baa5aeaae2
SHA512982bdf89e679848176bc430d799f80021476d496da349afa33d170072ef62ddf565616b2c7c76f5a3a411e88632faf40d2ba264141667ea7eba73310d9570d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579e13e5fbd010c94da3c87c4221fe6d7
SHA167fb7a678b2a9ce197bd9ff90985d7f3e2ccf850
SHA256a32b3015f56b952468792cba76d6cdd0ea5c81e1df8928ba6760b2b28e5c7d27
SHA5125bc51b82cae8b15082b261d39d35d6077c24cbaff846162d3d0e6534ba2254cd068762ede855085e7b43902f01f5043de11cdaa8ded47be7d2b390e9e94f6eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b8623c8c1559d33c0a81898c15725c4
SHA1024fa6a45d4b86241ac559869d98888cac898660
SHA256c0de4b0ae664a2b4697efaa3e4e038c1f2002147b1f57c7d86159f455416094d
SHA512ca168cc0e9fef2a12fa50269bc95a02f1e6e62c9fc4f2ca4fd6732901fb3846ff561658e8a245ce70405c7ecebe6ecd1d497209a0b308dfa222255767369c06f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aa326e8e8576ef5cd41f67c75d9d50a
SHA154bed866fb1bf8428075dd3efe12c3fec6bfae95
SHA2565b6452b94843ce2b14e59ea601036b4acf01e6f9bc1519314045b37a75c3c224
SHA5123d70fbfc1de65922de4a4f740fd79f74a967e1d8c2b485307577eb35653a783e8baa7d214ad4694d8a2904882342cd662c8957f9acbdc116f5610e4412ff8bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571a7fda5674adcf6c3a479b330e71a45
SHA11815861a23727d29f3943d460458fcdb9ce95d07
SHA2562c9630c272b549f46f44e035913331717e5e5393381168a7bbf85677b6c5e5b4
SHA5128300a38ddb5f424568bd39193beaab7ecba9eb9dc147041c2d1ebd56ca01ea40dcc1811082a2c27dcf903b5e0a02fae0c7fe84d0fca484df10414b563e64cc9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58587c751c9fbc6a3338e376c6e262914
SHA16e2e8daea4f057ab32d83aa9416252c860362151
SHA256a6b293392f9d363a82fb83d84147d7fc3fe64b036909d532a93cb3aba66c4d41
SHA51277554fbc6a6b0720002b2c31fdc1d4713f0854bb0679933aca1f3f48a9345ee6eb3bc8bb03e7cdabd3e7b7b7adb50570cb1149e6087feb24ee95ad1e2d617161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50acb7e5f22a6a4bf7973baec80fea357
SHA11763aca5a8d5b8309b7073b20599cd1138f684b8
SHA25641d9b9cc400d320c56a390d646343b3f35de3325062634e40671398f0ac773e4
SHA512c0057f55c023460a5f394ae33c038fe3db61c12708bd89b728c7d306cb443b2897b7247db630463231dc872d868faa90207f09338a3881c4bb7f13861196a633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d72c16b5c29af41f3814969ef51101a
SHA18b42a7fee9019d4a1ec1f612576d6accefdc8fd1
SHA2562512d8db308d39bd3b99bd1dfe36dbeba6a7ce53db5c4584b786cc25df04ea40
SHA512d256d1f17250fbb29fce7b3f865a4f17bc7290a552e8110ebed60493fe4af5f268fb5c8feafd19b25ec81baa2eb019a71486f71f2d9bb2884053e8bd7d0c923e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8c3a7e39c9d8dfbdf62d9d042052f5d
SHA1dfa9bc406f0687bc3d1e8b1afe0300446819986a
SHA256523024b44c9e131310c433f3d36ef5c91e19891428148e12ca76ee369021b0bd
SHA5129c437adff62b87c5560da5b91d4e0920fb69c775a204e500eaa63d6ab828b4986c893dd78d84bbbf187ccc47ae46e84bcf8c7fa9ad5d6b1251fdbdcce744a814
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06