Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
121d4630eca05f90721b70570d1adb14.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
121d4630eca05f90721b70570d1adb14.html
Resource
win10v2004-20231215-en
General
-
Target
121d4630eca05f90721b70570d1adb14.html
-
Size
1022B
-
MD5
121d4630eca05f90721b70570d1adb14
-
SHA1
9f8275153c8e8ad9580f3f27ec2e80c144291897
-
SHA256
e215adcbae98fc0c297c34e0ddddd7ce625f6e1e97a8f8b170021a38078e0855
-
SHA512
d2ee2ea6f18c4ed837a6605c44fa65d425ecd1a75eccec8a718f6dfa7ddaba043b333ec3ba8ae222034ad9105bf21f4253e8c170c9ebc45cf975fe0f985dda53
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409632143" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000f7965c35bf83d45e00bff408804cd316ae19c002b567b6d5b8f216d1ec42ab48000000000e8000000002000020000000800998393971e2220eceae2a1df2fb27814915e99182ef78db81791dd42c0a4420000000d6581839121d94f5acdc012a000e2f6207be16080fac8f04bb9df72737b436f8400000008be22f9615e88026c3dc8318e6f48cd4ad1a4358606dae47d551b84025f85ad1bcef1cef4c464c9b70938b579addf3950b01adb987550bbafde3024333ea1efe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF975351-A2CA-11EE-93FD-5E688C03EF37} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108e0dbad736da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3048 2100 iexplore.exe 28 PID 2100 wrote to memory of 3048 2100 iexplore.exe 28 PID 2100 wrote to memory of 3048 2100 iexplore.exe 28 PID 2100 wrote to memory of 3048 2100 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\121d4630eca05f90721b70570d1adb14.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500a3db231c62e92597cd9f55d7464eb2
SHA17bdc83646b2f28e5d3b11d2fdf4a54e878508525
SHA2564de0da97e5a3e5d99a1322c3b3298bf728164aa939d1eabeab06c2c50fbe3b10
SHA512f351d6b613108ea977359008d65f3c7a0a043b271fbf1d825c95e99eaf6a7850063715486c12941185c519a6e04041ebe1b7dae86eb4b9fe7bbb26517ecb1af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5096b4d12be3fb6550a8c5ed983609c65
SHA1049f1d5b72454ab73aed059fce03e962e750fbbc
SHA256812e129399d3bb57ca7f67524c34b3b91de22b5444747ad0e9ffd98b110be12e
SHA512f6d2b32b2f3a5f6770e7ee3b85786e17b7320f5b5ffac22d0fcfdb29be187bc972e38bc9743b5a0bc65d3fc89e30b87acf36492594218497ab1d1aea50093256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50130f895e384b3fdfa50541fb1f89b7c
SHA191f37866e504a0e121a0f323767130950f2e53ec
SHA2567a5a30e5ce66bd155d8290f700cb2ff94199ed2e1c40a662efe9dd93dc08a3cb
SHA51295f389f006e05c401556579e30c101aae707c410dca426fdfc42b458c2bd365bd9c7b69436b269ad32f6a879ca353e61e8473abf933cc42826cf53140d710bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e510577c487fafc0aa4b15e50f5280f
SHA1b75056d188a85cdbeaa27d1f98aa32ab559b4ee3
SHA2562a00a022935d78e0011db0fc1399f65c965b64aaaeac55664d5309e039dd3b57
SHA5128606662b18341fb1f480ade676838cf13a9e7fecea4e9e6427e5c2518d0687be5ed7ab9f9a6d043575d224dcb518182f291a94781402f4209a943de05b8848d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae10f22f6f6cebb4c0bfdf40a498c471
SHA1c8e60589005d60f11d258d96a361bc049456c77f
SHA2563d49efdc57c313f5f01b807cda7f94e9615d73b5db3af6c61d8ece1d6016e3e3
SHA512b8187a4c153f7f34c177d060fdc3e21a50c2afa67f63b6420a4cc9cd0f8f18999e526daa0ced458b8c31b12d98abaa20ca47781e4191f7b1e23db8f8a0a2c0d6