Analysis
-
max time kernel
1s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 22:07
Static task
static1
Behavioral task
behavioral1
Sample
3eff5c646449522540f0dff24b4ddd7e.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3eff5c646449522540f0dff24b4ddd7e.html
Resource
win10v2004-20231215-en
General
-
Target
3eff5c646449522540f0dff24b4ddd7e.html
-
Size
3.5MB
-
MD5
3eff5c646449522540f0dff24b4ddd7e
-
SHA1
90ae82c3972ffc5b56c48163036f448a7612218f
-
SHA256
b2facd638bb2006c2dc256fc115e0e78a4b57095def1a164408b5e35d1b8248a
-
SHA512
da4084252a80c97fafbb06103ddbdd3d06cff1ae0a85604f453c28a36423032c26f9af57956892273f4982df68566db1c2b6f1a6126de81a433743cd4604c667
-
SSDEEP
12288:oLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nf9:ovpjte4tT6N9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9B9AE71-A436-11EE-8CEC-72515687562C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2036 2352 iexplore.exe 18 PID 2352 wrote to memory of 2036 2352 iexplore.exe 18 PID 2352 wrote to memory of 2036 2352 iexplore.exe 18 PID 2352 wrote to memory of 2036 2352 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3eff5c646449522540f0dff24b4ddd7e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b65f5d640a280a51c00231e51351222f
SHA12c5529d1abf0e4b8798c07d37159ff96f997e758
SHA2561ba0abbb81a3132faaa232d9c38acb2fa1d3e863313214e808411302ba15115a
SHA512e67d95d950540c3a2dbe6281d562fa96c276522db5ba8895d369a38e1678dce60b3b1485678da5ca15f90a1567b43d6619a4f24f3471d0da8ea631fe712d6359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa7cf3695525370a1d17b2a82b3f300e
SHA1ccbc5251475ad3486d92276cffc3707c529a195e
SHA256ed44de86eb5b89b0c01c77a3096329db86a6b1775d613ac6d0df2fa3ab09b0dc
SHA5128ff2795327494859a238a6b5ee945d332506cadb9c43d95c5667d1b1c620a68c4a77eb510f7f10691673efaaf61bfdd0a3c95ed38428443874c07c3a898caa3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab8d233e953ed1362b648b4704d29cf7
SHA1ff04a27883c768deac30093ab69ee5685752bfb5
SHA256b0754ce45419d77d7537c58d1e026fb54f7a8f01ae37f15bd04c57e5f2f92b48
SHA512c22092a88df8029f4f78e51c7062de95bfd43e7775dc709a7548f344bb86e4e40868a17da89302752190b0f8e4817b2eec8a646f59820c1fcbd14e2584cf81ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fa7fc1f9287658729b4907fe0489f67
SHA10e9e6150b019add1487b8ef46458b9762af7d269
SHA2567b65f5786b577951fd56ec45431687739f957c7685b04fff351547eeea85d502
SHA512dc07ec4a01d1ada702d44455363919e8e7df2f8e7064a31c5e0ecb92be1e329b34801b17b99416c79ddb1592577bb1972b84b979b39958c82278999e68bf0f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2ad0b3485eb8b3890899c61ebc3aec2
SHA17343f621adb896c2db8e9b6dc31aaaafc3107112
SHA256770e3ebb9c1387c55c68391cdaa9397d134d0c4f9a966a9e5753113038d6f783
SHA512bd0e999c2b2757065702483700211f8aca1ab346393edfff8bd78be22d4cadb0152e52277a657a89117c98d1c9b79772210929433d256653441bd32e79a3d5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdfbc250dee08375679c88df94198822
SHA1a98b91c22252978758d451f78ae545b8382bb600
SHA256a005df8b809e236c88cb71c8f4879043f2c398303004d28d70be5f8852010a5d
SHA512565ea17bb1cd9868ef367cadb7b975505126ee96bb7053808cb1497dd5a213342e02f99f08671cb0d43995ff144c22c4f77e9e7ea1319d6d2c9b9c929ed0b8fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55a64978a150f536f552552eec1806baa
SHA1128916e3d3ac2b7dde98df1917f93a8ebe54d01d
SHA2569304f50a87deaeada515a1869a7a9a0edb54b4e365647fc8ab11c69953e0e315
SHA5123c192814ae0d5db220275e1e337381ab0af3211477bf12cd6f8ab8021028d66974ad247d8f57459c58d9f3c1daa94a4ccf3aa63153bd8b6ede6a01811b943066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51ba59c2085f5ad962e92c4044525ec68
SHA13b8bc17d63bb33e051eb287f067463e987d09fdd
SHA2567bfc67e85a03e9499cc2149002ecdf299254e03da01ade9cfd03ddf1b14315d8
SHA512fa1605554a3998c4cb53f6a2ca7f96b261f831d0668bf22137973c6c2961641d9454843f35951305bb17c3b60097e444e1fd8082f271488a120f804027338045
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QAOXZLTT\jquery.min[1].js
Filesize83KB
MD52f6b11a7e914718e0290410e85366fe9
SHA169bb69e25ca7d5ef0935317584e6153f3fd9a88c
SHA25605b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
SHA5120d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R4WCZKTC\jquery-3.1.1.min[1].js
Filesize84KB
MD5e071abda8fe61194711cfc2ab99fe104
SHA1f647a6d37dc4ca055ced3cf64bbc1f490070acba
SHA25685556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
SHA51253a2b560b20551672fbb0e6e72632d4fd1c7e2dd2ecf7337ebaaab179cb8be7c87e9d803ce7765706bc7fcbcf993c34587cd1237de5a279aea19911d69067b65
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06