Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
127308b9b7233dda5b8d9d200d0a7906.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
127308b9b7233dda5b8d9d200d0a7906.html
Resource
win10v2004-20231215-en
General
-
Target
127308b9b7233dda5b8d9d200d0a7906.html
-
Size
44KB
-
MD5
127308b9b7233dda5b8d9d200d0a7906
-
SHA1
b2dda5b9f3dd7d7df1cfca792dbebe6ab52f232c
-
SHA256
34dd16d90dcff216863a8727698218e0a8fefbf639d9fdca02e39e35408c0621
-
SHA512
4b822b47101f48fbe1c3729049b62de9fed0fa64d5f82456125579b40d0619059198fac97c2128bd99b15b711236ecebb2d58becfd2086047cfa2a9fb690829a
-
SSDEEP
768:mwS0l/sGVLsk8ejW4mTNn2o9RelgB793ci6Vk:mZJt3RelgB5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D928921-A34E-11EE-9240-46FAA8558A22} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409688677" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40adfe865b37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000b84b63676df469ae9d99e6d0c9b3bec23366063b02fd146c9c74688e7f621912000000000e800000000200002000000040f1d57939335c0f25e62ea37e198d7bc04ff07f2a2ebf84fd1c261fb4b7c7d6200000000f1ce8809f258df8fbc231089ca95aafed96bccc58516bd49fd262b3bd7a0177400000003bd36bddeccd5a772c430e8791e9239950324a6b8d4128fde331451728819712a7ee1073ded6692725b16b144a9177aacd80d07b99bd04ab51f394f97ad55983 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2428 iexplore.exe 2428 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2496 2428 iexplore.exe 28 PID 2428 wrote to memory of 2496 2428 iexplore.exe 28 PID 2428 wrote to memory of 2496 2428 iexplore.exe 28 PID 2428 wrote to memory of 2496 2428 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\127308b9b7233dda5b8d9d200d0a7906.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507d4a7e4c434245157212c6a3c8c1bf9
SHA15d82ab24a0ab13fa4eaed06367377d9c17f74ed4
SHA256e67fc741d155242d6488dee17c340d86481fb383792da09a95ee5b760eda288a
SHA51265bbd7b02ef8fd6c51e16570ba155a26e9939344154032acd858cfe125dcbbc17c10fcf3a36c5ac3ecd8217ab0375a67da696e9248565fcaa80bbfac72c277c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5471c8c70e2aa089bffcab5bd55416f84
SHA139d0dead0ef263159c06b35a767f380fac558825
SHA256b4209d0f775f6aa8575c65e5c956aaf14dc4cc086145b77691943adf5947899d
SHA512777eee6479c841d734e9e0574f342490b5347065ff97499f6872591f0ed8a7dbb6daa0617fcbbdd30a1c0f136596912b4a24cc2c3420d5cb624a7b4face4654d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b48cc82f327c42471355e6bc5ccabcda
SHA1f93332a5a86efb62eff8eced68dc4df22e1a44e3
SHA256de1b25499c09203d171fab0256ff7ad3049faafafce34643c17a8387de68c64e
SHA512e8b4c1185127cc4b2fa51510017ca10d552eadb690d27d4f4581603ea0f29e96352938d06e48fcf9f4a29ea5ded6cdd67494b38e1a6a402a6013b8e6ac7538e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5000b51df664bfbc04976336a588becf8
SHA1d3811d9eb73e38d40633f7216288018a0f5edfc8
SHA256d0dd1cb906e9af6816276a05cff9276e4d9a4a2353cd9c93acaeedf32ffd174c
SHA5124dea0672ea4dc824bf1f90afab5c7d5fa119853aa02bb53ea42f435b0b736da4989689aca2d2383442c785b03b5c0a6c4f2ec016887aa9025dc1f73a0d948451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfa46120a2993afd61b688b3e2abe259
SHA17a397152866716faee2f188765f3c5d4663f901d
SHA25696a618fa8b8d02f5a1d3915dc56c2c3ca202dc6ddb3f1f632ac540250bce889c
SHA5126dbce8b040f09a0b343cb4e8ef40c899fc4e08f8a3e48bb3a73f32328314eda4d78e32cc15adbdda3e0476bc87367cf9fc9649c2dc566d5bf87fc6aedbb10dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50895dd071a388a8cde96b84088d54a1a
SHA1f6e2b49c62b5ae190a11f9d70c8f414f9503d5a2
SHA256121a05e7f2e854623e12b8226c7cbbd80bada1259bcc9e575f7333890456b736
SHA5126f4a7f40078e42ea16b27b5df34930a54c516d749f8ad4d6cde9b101da6fb6dbfec00e1dab9bbb5609fde48c5cedbf978344d3b2656cf4a08039f4fcf583078d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f21a1a1ea733f24ddd18be8ba488c630
SHA14600f0c5bf57303316b3f0e46acc36dd35e397ad
SHA256bcaa70c73ca9cd429172a6f4d0329dcff1d44e1727760c5c4b2ee5bb634d94e8
SHA5125cb877074c7831b6c9b4e923820675eca380269c37c8596023a40251e249d74728b3999e638443f52ed622f33f340410d964a8743f48ce68c6cfd6f38ea6f897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521751655b10f32c701a91506708881f9
SHA1f7146e847fe1ade1c15d233e60f6b0d1e516394e
SHA256815efdc10e8bcac35ea6c157d944d74a3f2d11557ff9d80ec8c1fb56bfd0e059
SHA512fe572ba1dd62e33df4cc6e57ccafc6a54eaca9bc7c179ec2313965316c815b780d1251798c5d32b9d3649b637a0654a1eebe78d7f911909211f0309570407541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddcbc253a37dfa67592b4f2953aa192e
SHA12106ad3920863b7283cde0be7c01c1c768594f46
SHA25661948c0acd7c44670bb5c2369af395fa6352344f3a728356c838a5c665137a2d
SHA5120e1fa6e10b59552eb2a6bc1b3b46442e66e29ba8b3752e476742aa3c37e152bf97d9f7baf3ba8feb16246fbbac43ef77680e8d7e00dce9a479a71e576bfe77e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad0c47869c689a544f1b231317e9d79e
SHA12fe1cd90bcda7f91774f88d45533ccbcff83f25b
SHA256a341849c1fc0812eb59f3fa2af5c0ec4633494b7d6b5dbc7916b2976f9c88b6a
SHA5120dbf0877845cddf643c4cd53a9fec4b8a449106d38d2714e9c9bb1d0d072c63fb135d2259718fde636eb032256523b9077ecc0dd7ec74f3e5ddf2dac711342a3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06