Analysis
-
max time kernel
0s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 23:36
Static task
static1
Behavioral task
behavioral1
Sample
43a84949aa50bb86e2c328e17c330269.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
43a84949aa50bb86e2c328e17c330269.html
Resource
win10v2004-20231215-en
General
-
Target
43a84949aa50bb86e2c328e17c330269.html
-
Size
9KB
-
MD5
43a84949aa50bb86e2c328e17c330269
-
SHA1
a98720a786d4989b798ce4a32419c5ad786f0920
-
SHA256
e4bf4c6add048f25326b39690a3f6ea17c2caddecdf91a610c406ce8a8d4bc41
-
SHA512
a1d1fc800cab3e09bfdfea29d9c46a90d08ce65fb2598f259f64eea9c6a8647baf54618ba004e9ab2e95c03541ce429feeb6017c996d8c3c4a8fdd665eb9de8c
-
SSDEEP
96:uzVs+ux78/LLY1k9o84d12ef7CSTUTGT/ka88pi7lVHcEZ7ru7f:csz78/AYS/yWi7PHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D18FF41-A44B-11EE-A731-CA4C2FB69A12} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1064 iexplore.exe 1064 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1744 1064 iexplore.exe 17 PID 1064 wrote to memory of 1744 1064 iexplore.exe 17 PID 1064 wrote to memory of 1744 1064 iexplore.exe 17 PID 1064 wrote to memory of 1744 1064 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43a84949aa50bb86e2c328e17c330269.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1064 CREDAT:275457 /prefetch:22⤵PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD566a856394296addd704cb6493104e5ef
SHA12514aa2429bdd64a429cc22167fef75e8ba8f62c
SHA256bf9f0b3dc5544fb65d3f9571a162602b3a62b682fe50a259b198ab2ccf320780
SHA5125b0b5408746b839d899a8ac39d146b81b0ea326d13b9db678718d5c36ea482c39b95713567dbbd19e79ee6e6905a0bb6bf9ed16ac0c7e680782de97fd85cd5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec3922d457ab63667042781848be37c2
SHA1f9dbb105aa1cc1a102b64d0ea2495808cca5cf72
SHA256829e5d687e581efeedaac64989c1410a5a7c561748bed6fd0ec295bc861ec539
SHA5123d9dd6de6b578c86a90f4bb87e0b06576e5373399c2b20c6c6b07e3d67c70ece875bcabb077b37fbdfb725ddda0c861f156f48fa88b8e9b443d36b045f81f89a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2535eadb39d07d09afcb19cac522821
SHA18b6b3911b3bdbd3fd1608f74df60f5841cdf148e
SHA256a134b648449d7d346643c7620971a7bc720d8c33e592f81d73581e915b0021be
SHA5125e4bc9b7aaa9375a0d46b0eb31b27ba6dd6c01b044a706b2b02a884348d7c9c0f268bfefb5e3addafe0f1e0ed7137d91fd02f2b854f20efedc79e70dab7311c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583b22065627a264c4f5ae10b8e273b76
SHA1ba430c587c78500140bebdace8b4a8aab81ff9ac
SHA256283adb6174ce41b42c345758610c06c598e38edf1fccd928a4cae41fb210407b
SHA5128f3cc7838fc5541eab11177115145eed26b0137167856e88fbcf3993f98531692d9c761b2ed5998437bb92017e152d1b4ed92e51b6f796bb0176346d68d64188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e