Analysis
-
max time kernel
118s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 23:54
Static task
static1
Behavioral task
behavioral1
Sample
44920c59f39080b1a0ee4b378f6a436e.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
44920c59f39080b1a0ee4b378f6a436e.html
Resource
win10v2004-20231215-en
General
-
Target
44920c59f39080b1a0ee4b378f6a436e.html
-
Size
53KB
-
MD5
44920c59f39080b1a0ee4b378f6a436e
-
SHA1
7399fd27f58b8a5aa23d2f472d6c690b978d3fa2
-
SHA256
e0f6cfc8d004b2da5b7df3a336a187780e05965bb1a8edbe68cebaf3f760d566
-
SHA512
10407f7517eb5b57110513039eaca970bbd69598b67299aa5c33e0f609f9f6471644914e661a968f1a9d741fb257ff8b81fbddaf0be78f6797283d90076b2fc6
-
SSDEEP
1536:CkgUiIakTqGivi+PyU4runlYV63Nj+q5VyvR0w2AzTICbbpoe/t9M/dNwIUTDmDd:CkgUiIakTqGivi+PyU4runlYV63Nj+q7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000507f5b136e3646a3718b616da9962346ace19e964a454f66359d3eaaaafa96f6000000000e80000000020000200000003f9f47976a4b08c077d8f07f992d9969fd96ac923d49e0574745f453194a395a20000000911f30739470f49953f5fe4881f8ea247a581c8c2df37a09bab7e036d82add51400000008176b0116cda60736521dcb774cfa010d0848cc5a41ff0668fee8d5bef481acdc6cebca5d2814bd198f423e6fea237bea148505b15d390e252e122e439c3ddea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{773B3741-A92D-11EE-B279-56B3956C75C7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410334220" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c06e673a3dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2992 2180 iexplore.exe 28 PID 2180 wrote to memory of 2992 2180 iexplore.exe 28 PID 2180 wrote to memory of 2992 2180 iexplore.exe 28 PID 2180 wrote to memory of 2992 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44920c59f39080b1a0ee4b378f6a436e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524e4e4ef1d59faa661d57b8ed7a1d11a
SHA164e7854f3cb83a6abfdb92f6c4229bd523d866e0
SHA2568ffdeed39df44f7f3ced28bf7001d6488ab95ecdeca8abd1d98f2fe1eb1ecf1b
SHA5122c434e9ddb387d88c5baf512f81a0b34f9085ae5b579998d404d652ac07bba8c0673ce8f94a34322df651710cec6f99b18a2994eba11362752e18b54bfee946e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea8d8be1b6dd7a7183a45a54d29ace8e
SHA1485f1d4285d246cd466fddecf025b38d914f1105
SHA25694c5537764925ec0f3b0c409f163eb7b8f9e24a869582cba8f393463d01a23b5
SHA512f857377940ccd2e442f30c0589cecc7fb01845c341ae4077479759dea3fa088df651eaebce0b1f1343f5636b01c82d3b677a33f1b0f7e568c53ab2489fc7abcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5198b2c7c7b2b2b3bf7f8c0ac2da6024d
SHA11c9b8ea7d25909340def7b47770965d1e122b211
SHA25665d1b4a53d83097086e71e768a370b649285f56b5b5eae5f34b92f04dccb95be
SHA5126eae0652d1e829806bb950285e8bbb21ad015c772fe6f146124fa67e102af2200ba14eb44ede5194e19b1c44d41a87d7b048955959b35730460f7c5b16d407ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea42dc2263ba8eab8ab6ee530dc9bc66
SHA17b771e358104541a6bb5eeec2f5a7ba8a361b622
SHA256f421a064f6fa98240265ae3c91fc1d434949314ea03a2cae36f61a48f496034b
SHA512700cee0656ab00062ae4447c7a1fa5cbe80cf55d13436c76f4050e7a8f4edc508c3d5a2c330190d9eab98144965f696658b1e0bdf76e896f4c10f9c99102d71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521c2c7d65b80c00ca7e1c4b0faf3457d
SHA18331c23d18700522fca428aaf9e8e914364ad5e4
SHA256889eb2f9a88a8ee9ef206f292272abd0fecd7d503b99bdf54bd64a2fe2dfa595
SHA51220194f5245c4289435630c81f1cc6c89ccfec50442e634d37d1a8dd9c21c36836438d6467c76b8f8061ef007437a7a157fd991d4aa885cf400faaf1d4ecaf5ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a0e4d0c222420259f7553bbb563f11a
SHA1164c4f9d5728964fccd88629e7b301709c606ed1
SHA2568b631a9ad94a9d97b69bfe9925ce5d42cdfbdb7af8c34b5e22af808e078ae4c0
SHA5125da5f899fef90762aba5d03a3a783480b1e4ad53a7b616116464547983aadbba91f6c1aa0934159fb1a53720cbbb5bfa9d9a05fefab2c7a70264f38db3387767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57139028b94f1d05c7706d6c68e019027
SHA1920839b3994228f57a8494d22d712843fb3fe5df
SHA2564370296b5e0d103909c91145a9600c66609a2c4568a288d1062329860730494b
SHA512ab7756ba5bd1d40767764e17121fac1c5ce0d7766d5a65aee6b7507635276893775ee596f163179154da27e1f3cbd00742c9b7cae60152dfa39b0d2803420942
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YT4IJQ91\normal_post[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06