Analysis
-
max time kernel
121s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
4314c12dd2dcdd22a09ab29c5a12f597.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4314c12dd2dcdd22a09ab29c5a12f597.html
Resource
win10v2004-20231215-en
General
-
Target
4314c12dd2dcdd22a09ab29c5a12f597.html
-
Size
7KB
-
MD5
4314c12dd2dcdd22a09ab29c5a12f597
-
SHA1
4265b05c3b17f66c24b4c59c047870c50695efc5
-
SHA256
e11a9bff19e9a1ec33f23dbc42fae29abb5601028cbca7100cf49eb97b342319
-
SHA512
8396eccaeaa115a115e3a644268930e0ca49453bd2a4761526a141ef5b9680a5c0ed13ace1cfdd9368f341519aa561a30e102dcaaa9087040868f3189d4fd947
-
SSDEEP
96:uzVs+ux768LLY1k9o84d12ef7CSTUxzfiZcEZ7ru7f:csz768AYS/Zb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A081031-A67C-11EE-89A8-464D43A133DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410038200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000a28ced2230ab99ab251a908216a51b1898d6d55f307e4c228df425c69fe4d9d8000000000e8000000002000020000000a343f5ea15837812c85732c5526d3b15cead31e41872d97801b86f5e9c61ef2720000000448b45732e5e9b3605b45c8a5e40d0407b609ce9aeccc4e49d246886a21134cb4000000041e193eeea539e454385a0516c443798fa60a7b33284f7e3d1596f292919f9fba913c93328ec3a21a14eb55b2c3fbb56677b8d764b0ef53071c0a39868348ae5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f0a825893ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1040 iexplore.exe 1040 iexplore.exe 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1040 wrote to memory of 1800 1040 iexplore.exe 28 PID 1040 wrote to memory of 1800 1040 iexplore.exe 28 PID 1040 wrote to memory of 1800 1040 iexplore.exe 28 PID 1040 wrote to memory of 1800 1040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4314c12dd2dcdd22a09ab29c5a12f597.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544adf2e437efc4548952fd6fff986811
SHA1e318365fa321c8e7afd5d86c4b8fd33254e16c0d
SHA256e4b19dc1cc26239bf118294bb9147dccb897d9023654c599dbdf18d52c91e853
SHA5122072812f2aa8dea50cabba537fa06a3487d0122b353bd705f542ae7d261549f24ffd38a04d9af3ebd4b61373e3e96bf6b45e8e51557fc20341df18377371069f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537ffd35ddca5c51a325a867bf8c0a7a7
SHA16eea0fb3a508f8990cfe0b3e1be99cd86bdd4011
SHA256a3c220fd96e1aeb820e4454c113a26771a832ab3edb27c5908a7442cf67da647
SHA512092937bfe0ba53d70be5a814a413cb0fd873e013c5575aa5691d9a6b3064b4f44e1d183ed0b15f5ccc0acec7538749394cbff77dbc253125fa6731e9429731c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5116afd287ac4b981fe892e3db8f0a619
SHA15bf0f002be1ca4750f29b8776b31a6ab2f15ebe5
SHA25695e97333f6c14a900c2dfbdf53d44a62ae9417a146d0cf51ddf6d61d1f52e5b7
SHA512e6ee4f301749dc2913367c5f6c99cf14ed8376ebfee9c81d45d763cb7999fd712ca2ad29e838d602cbba6d5f193fce6b2a4513c8cbf4a557ce080442ab692283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5047f331239dc137e35ad9cd7ec194ba7
SHA14d97f2dc99c02913b8bdecfdda8ac1c1052885bb
SHA256ae4c729e17009c41b6ceed1872f1381d3b9c9e809b4c945991741bbd321cba90
SHA5128701583dcb0d9d63611bb3d042f4ab3e7f3464df2fda466ecc1bc8f1bd0b41cd879d3db049bfe041fe728f900499b52b114145ecbbc4fdcd7254d22381ebe4c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbeb04de9bfb3e0df440fb81258e5cce
SHA128bc61714d6d9872e19f4b10f69aa717743bcb82
SHA256f9b8938ef9c030ad40a3c73953137774e60d6bb525ad0cbe50664f9c6b218f99
SHA512820364df89c0274e636c8f5a78dc19904eaad63bdb1b0af4f5eaeb5f1a1b5d4f287fc57f14565223791e248209d0574bc32275eccdb9495ab69b49aaa6bf72d8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06