Analysis
-
max time kernel
75s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
12a455c729fbb02b1694461e2bce76d6.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
12a455c729fbb02b1694461e2bce76d6.html
Resource
win10v2004-20231215-en
General
-
Target
12a455c729fbb02b1694461e2bce76d6.html
-
Size
12KB
-
MD5
12a455c729fbb02b1694461e2bce76d6
-
SHA1
83e0bfa035b1b8532c5395b24989a1cee7d2dc45
-
SHA256
8d7946935eda7d815fdf0818d761cc383cd9476d784c449966eeae32adf858c8
-
SHA512
21108300e75e296d10493cce07cba13fd9e3ede08bc14f541297454cdd00082e5e03e0bf45c2dc690c656e73daa388f8ec73b8df629ed5fb666d9759a0534740
-
SSDEEP
384:tLU2P/k1OarnUaHv4/fTNX90RkPHndsByKf/:vk1OarnUaIxX96kPzKn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ae4c17db36da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000e03ddb56048e52f2cc6e32d63a41a79d45a7d920da44150d80be9385022826a4000000000e800000000200002000000072489577c892a9241a60c3b1e97439cdf5d261af3f1dacb4b14f4d0c4676cbad2000000026836c60f29cac1e61a3b48bbaaff09d238d5711eb61e34a9885c28d8cd00843400000007c1a4fd120dcd5165a7814a91f4ab302780b1dbac65e7ebe7bd921c193e1ce60750069536fac525f73e25bea9a74bd99c34bb277950735ef77cf3f20931d074f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409633601" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42D1DAA1-A2CE-11EE-A68A-46FC6C3D459E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2780 2216 iexplore.exe 17 PID 2216 wrote to memory of 2780 2216 iexplore.exe 17 PID 2216 wrote to memory of 2780 2216 iexplore.exe 17 PID 2216 wrote to memory of 2780 2216 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12a455c729fbb02b1694461e2bce76d6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d9af2217007836f68c69b694457a2a5f
SHA1afdd67ce4f9d9e2d93919b118281c6fe217c6be7
SHA256995aa11e92de4a915a6dd3fe37fbf8d5dd2e89531d6d47e3bbb1b1458effb007
SHA51284763e542aab668ef7d3120ce0a8795ad49e52e48faca4516dc33770afe8efd349d53d2c061b47cc9ac77bc4a9843141f604b6b33a02d754ff158892cced510e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5124a6207deac775a151f77f9874b1c
SHA19c36f265477790c86b1892599a2a7da8ff749fd7
SHA2560f4b77a49b0322da3f97e024f1cefde89911ef3f4c7ba85ee2c22012bf74fd65
SHA512969cf3906ba7bd677661a6449209717fc5a22793c1386fa11296d8d8f5413961a6066879609f75529bd322b288246a6b0b3f9bf631638087521525dbbdb301d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f571e66c62fe7bebccaa2b33aefe9ed8
SHA1e6c1a0ac7ee0b0e2495f106281c64ac728efe962
SHA256418f0ae60f692528ec065c2eb0b270bd2109d6c4561bc74581facb2bb4e7428d
SHA512c6dd2a2159366f61e1f1d3fb3629e7f6f45b2b2a00ebe929a4bed543e23a637783fbf1f41cae531967ff125b7e1ae966970bf02c49a09d0c254533778f364b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dcfa84b10211462aad4f3025311e0e1a
SHA1accff83ebb2edf5d0232bf718b26a684ad56506d
SHA2567644810db94a1fc0ae9f972f8f8a3b7a8995be03142d9b06645e904b70ad9dde
SHA5121b4a00f24d4758d033ad2fddf87e6ea2b87c065d6ee6266fd82177427f1a03eca4cd5c0b74e0fea968d98c0f3df5d421392690eeeae553a6ce7bdb6f8ca3b2c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5785bc7a851425f4efeecd9eaf454ad3d
SHA1e83978689f531fbe8fb075328be0cfd288b11123
SHA256d00aff563e572a6fdb589a26703aab9e8ddb187c32e62d9da79992b5d29c537e
SHA5120362f6fbddd9836383ffe6a075075b631682cc035f9fa30e734c854374a2b9d7bdc0a56ba9c4002898040615cb580264a97c20f2cf185f7fc08684a746ac6f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b906921dad6cce8f2a82a45bb3dc4aba
SHA13a32da9afdb07b889b016aced8acf9643dbcbf17
SHA2564cac74e8169fb046b4d15ed6e279fb6183fbe39b26a5acc9978a00d3a9e23bc1
SHA512f29feace530a1157904545533e80f23446589815c92f2d3a563d172b24fb3c34e7456d1d25da793af1299390e47c4e79800904191626317b9cd5401af7611569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ef466766f210289834bc2747ba857007
SHA13a3cc7a8bcfaf015792fc662abd5b1975f959ae2
SHA2568d4ca12d2a500017321a3e7271112f296a715f1e018f13be36a188b415b30757
SHA51212ffb21f0c5bd84345c765d72cafe1f685879c91669006c65fece63379c35056b69def8395a57e9be19780791a8ad1b65d20589df1def513137727e6b8ba4c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b5a838e2b631c0b9886b9b953342704e
SHA10adec2f26ae7eb8165e504b12f14cbb11c1b3596
SHA2565cfd278855aa7ad091ce721d5596537874d7c7e3190f8087b4bffc71b2e02f5b
SHA5125230601ecd04b620add1c2b869b103ec6e975202438b5c67a0dbdcbcf135516e6ee341a83d4186874c01f61a06217f3d19a470aab64736ea546c4d161cc2cff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cc5f0293074642d6ec737a697d6b7ff5
SHA1eb71a202eebd37cc5dddbeab53fb63ef11c5f488
SHA256153ae63a933b99e3d167bfbb144eaaf344e1c3fe52a2a4c91a5242a232677621
SHA5122a37404cf1cb101a274a117dae0ba96a3ef420300479642209a170a0e5f6e6217f92ca63136a764750dab88217ab727576e801fbe134d542319961384ad9e75d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5626198072b9863fdf3a9d5e4f8f174d8
SHA1eb4fcee8c3a37aca1de8b9635e69663210b7a90a
SHA2563d8807dbe697cb296fc122b9919e24cfc497e90367f318917a6d10faeb2f5597
SHA512cb8ec13c40c001041d14d0bcbc82cc3c64aecb86e88e4ff80f75f2a59d035df3e1583b8939d25f6925ca8462bfba759e06aba2c01069ff3e491154b92d32289c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58bd1570b714e3f6aa75ce027dc1c9fc1
SHA1fd3ff4a876a3773f3e48c669f792b0891f250cf0
SHA2566ff76c9286b523032cf819950cadc83d6300ee83a5a5b50ed4fb56ca6aee757c
SHA5126a84ef072743c2b01aa1f92e3f06bb98aee0d1913ba88f77c4a588811ed9d27c95ec7ea3f4843c08e3143d42e001a419e9cf81976961414545fc212e60ab8f15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fdda5c1e8b097db49255c84c9a44ed7f
SHA15d0a86de33ec512666851094a1a4a77fb8d4113a
SHA256555895e4fd7683c69ed9e6ff20bd31f27dd1775fa7eb3acf6c4b11aac2c5e082
SHA512c3b69cb92dc8c8e20f2a1039612c436405e95366df662fc7e68d3cbd59be96601091edd04feeb84218298cb6187c685b0d77de9d984aecdc57c82509ab290ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b9887f9cfa4df34d4e6f7d4e55a2702b
SHA142dd8764a01c8ec02db108653f87cefb6a99e772
SHA2560d81ee7b4926a05d509e6aa722c46c10748105ed72147ba5eefc5a4c6b959078
SHA512b0fa338b31de330fac04a2aafd22ab66bd33743063eaa6f2807fc41f0307727e720d68412c959abdde190bc0980bcc6d5a6515e3a0e8b3183f995ad394981498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06