Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 23:39
Static task
static1
Behavioral task
behavioral1
Sample
43c896d65dbc939f3cbd7f1fa8196f52.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43c896d65dbc939f3cbd7f1fa8196f52.html
Resource
win10v2004-20231215-en
General
-
Target
43c896d65dbc939f3cbd7f1fa8196f52.html
-
Size
34KB
-
MD5
43c896d65dbc939f3cbd7f1fa8196f52
-
SHA1
22bde8ae297c228ab15c3bc5553115e1084ed3bd
-
SHA256
e34cf9e341c3d0edc8a5c96b937210f227ead8367fafa85b65b60dd561b28629
-
SHA512
fe8ba8060791868126acb3a96eb822bd917de4233ad0dc62ef3e6474fe0aa3eafc4b8b53df4795a1e4cd3217f338728a6416501efeca830ed863bc0159b66128
-
SSDEEP
192:SIzarisRMLsCyp4NrSYgSGTuQpip2JtvGfyFDsXBmPvIaqgcBB7ErwaUvaut6TxO:SIci3sCyp4ATTip2yeHip2SXr9+isU8c
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000278583a0017ac29c010b8ebdc2b7e211a88f2a678e5c1a79dc5f13e1d8082cc4000000000e80000000020000200000001a85f2550167a4e0af29a21e7695174b8a05e433376fb1e721cb3c8ef9c0382b20000000bc7cb334aea186f8ac597c71610149043afdafb6530d9f6a6299b4eea974706c40000000e8da85b16e031378c79e39207c834165c93654e8c5fe08ef7059c544d5d862bcec84bb0d35da6c34b69974e974b93b5c9aaac5c5eb218cf2db7adebaf93b383c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08359a75838da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409797443" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA31DAE1-A44B-11EE-9569-6A53A263E8F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1044 iexplore.exe 1044 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2924 1044 iexplore.exe 16 PID 1044 wrote to memory of 2924 1044 iexplore.exe 16 PID 1044 wrote to memory of 2924 1044 iexplore.exe 16 PID 1044 wrote to memory of 2924 1044 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43c896d65dbc939f3cbd7f1fa8196f52.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bfb20471441a4b5bb4f43e652900792
SHA182b3e1f09555bfe34a058ccf6e38112dc2fbeaf3
SHA2561c28f45395add420edcf9ccc2a08433a07fc79cba8680a579661f95705445f72
SHA512e9731a90b6b24a74d2121d25cc95a99580e04ed749cef6e11bb96b77557c7c9c4c0ee948e8a6453f68f821dc0e6cca23291e73b0b6690a3cb812edbe0e488efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501c8f72ffbb183dcd35488aacc078f92
SHA1ac221c1c152d384194724afa200bea0c930f6103
SHA256eb874a2df7d7901418fa0bfc12b5282d323e6a33ad9af1c569df045422c78255
SHA512430256591b6165d8310f7cdc9e2c12a16bf310e7c49ffafc986da19ef9195a7b3a10d1fc963f454fe5c4ac7fa18464b9d938c64e099f3e4c2e1e7c96ab09546d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2140bf7ea958a3f1271a4dbb21fc441
SHA152d678266fb55a82f892b3ff3b66ccae3c1f5c70
SHA25636d998257171fc91d8b21ea70a5a4ab0d333e4af86bec1c0936e4b95f87b9d60
SHA512d8177e5a445d31a2fdb15c218cbc85bcc463e1dd6b1796fe79c95098cf85d2200d7ca468453f3de37e5a2253d81e44eda2c6cfc69b018b8610034b5bc2c3f747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570683b4dbddbbc3c7a0c55b448ca604a
SHA1b754d7a9270e1977c56538c696ab85e423918d14
SHA256c4abc53abe036296f6fc4b2368e1b8fe581d00811c9a84b84065df2e40f4fa93
SHA51258b7377c8df05feea1546948ce6dc3267dfdec0e66aff0b083dfc02e79e9249a2f5f20da1099c91297a549f182a90cb369a7c531734e03f3d67426e2412e3b96
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06