Analysis
-
max time kernel
143s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 00:49
Static task
static1
Behavioral task
behavioral1
Sample
EFTAdvice.htm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
EFTAdvice.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
attachment-2.rtf
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
attachment-2.rtf
Resource
win10v2004-20231215-en
General
-
Target
EFTAdvice.htm
-
Size
254KB
-
MD5
28cbef8d9c48d1cf358bd42b7fd3f6cb
-
SHA1
548396eb4aa75c524d8abfe8e08efac5f0609c12
-
SHA256
c3148d03ad3aeb6e3ddc6bb206fd0002e60ec4fe1728ff6ae42bba9496bb269b
-
SHA512
ae0e05dc54b2e7f70bc8e6850cf1f0f133dbea5bec61e59c0cddb9b8e3b6ccca039e8ba8000a70f034b6604da1588bc5d0a82b35f842b2052f971f3c96507ec0
-
SSDEEP
1536:3aQtddmn7JiIjCGfkMOfUzh+TyuUzifdEXYmqcCcdRjZDOO3/jpjW0/51w/a1fIp:qQo7UBcROs1+hVDcDdT31nRf1iTD/L
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000696cff1bda10866f70a7cf8fa67c18ec3e84d9401f0c32e5864787fece45755b000000000e800000000200002000000007f45d6bc32523e2706eb2bc4922d2af306e2dce41f12587ac90d2dd2cfa54aa20000000077a66f48461cc34a2670d1fc41c348988d4c0e06fab566a7c6390c22ada152e40000000c8f7cf3cbd308086a9dd886d13471b8ca83975f6d868c79397ef7d0d1b15f1a50ff0fa9603f513b5924833c985d727470e7e9c3256262f4c3e69465c6b98376e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35E244E1-A3D9-11EE-971F-6E556AB52A45} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409748257" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d013570ce637da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1988 iexplore.exe 1988 iexplore.exe 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2436 1988 iexplore.exe 28 PID 1988 wrote to memory of 2436 1988 iexplore.exe 28 PID 1988 wrote to memory of 2436 1988 iexplore.exe 28 PID 1988 wrote to memory of 2436 1988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\EFTAdvice.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585474e6cb52780d5b9955eb56a000152
SHA109f3fe8d8703d212527a076e5b654886d92097da
SHA256b04910a448fc7944aa7d2166800765d2d8b43f78227f27fd4ff486ee507ba347
SHA512fd71a6fa719789cadb85389c837700b8287a3b72c42b66df47dd92be9c2212d3872fc972fe4cf749baa53da3a5a5b0b5cdb362083dd9614fc863889519d21297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b9e7f045707df31fc477b43e4b3f6c0
SHA12b89bcc8518eb005cb52268b8f590489fe5470a0
SHA256b5ef3d2e039825e6a3ac670b9398ef003f5d70052e7bdc4ac359ca18f3f8d287
SHA5125a6cc64d1f91037b19f4f0f22b7576b7e0435abd8f9d8e99e2ccae7679f667b4c019294a32083eef1eb7035fcb8a793d85144a943e811bb06e06155a92ca7c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5144d498fe215e30f809265d415a7506e
SHA17eaa0dd46d711f11ff5c6b964add24e7eadfa1e8
SHA2567e53a8de4a56ec71f10c3c254d6f6e858b73205553598465991db79d26e70a50
SHA512d0fdd60303ce0a063f8a7141703816cb992744f1ff96d9fa2504091ae8d6df755147f97b5e908bfa534a5e2f1bd1083615677813e543c70e6113417e49eca602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50158b0c852441c9a230ec7fa28d7372e
SHA157c0e0db0e2dedbe4cfc2588640084f8b6dee5c0
SHA256a30ceec69584f020261bbd4d3e40aa1ccd7e3157bbf8135495b2622517413202
SHA5128068271b1dc7ea9e8dba03703c6e0fba41dea7f5c16036f4cd7834790e5af2388663dea1a89516316b0b47b8b72df9c9615cc1801e5e33e8fb5099c75bebaa05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5287643f107893906fe3236a0b7218edd
SHA154105166acafe9d1fdbfac20dc0937d078259aec
SHA256a4f7e5c51fcabf56a6cb5f8366fd45b71ad0175545d5568607ff20ae523e326b
SHA5124e3a41ac7e9578497dcf1e191a25530b039a6c30980fbef347401655f95e1ee4bf4511c735c1553d79caea9030d497620c801d6d1eecaa3b39eae354a3bd8148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ba98f0c8fe05f221b2376d405a78532
SHA13e149b6b7312d9e1bc0ee7b9a188031b89b5ab9d
SHA256a7b9a41d579dae416bf2916d0285115f2789aec8a3860e10e428ea46d70e085a
SHA5125279166470d7badcdefc0bf387a2f1e009f7b620ff11e8f34e7f484de7b31ab8ce3e40042e9a5f286672405601f6d88cbe4d9c63f5ab9beb1187154d33906126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5c0d64c8b914c7d32a403586065b284
SHA1b959199b7c930dd197681dfa0ce0376562a4d7a5
SHA2563a7b9a7aebc20cb5fcfa9999e5c52ce33c991f263c3c48690c4b6b5c7603853f
SHA5125a32b430e6429f62a3f3dcd26bcce8aa6a1f928a7fc499e1a84071478d50e75354d79b870c28bb457ebccca5ed581e0253f17de3c3374b11cec6f5cab2c50efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bffbe5284cf517a2fcc4cde63b4f8b4
SHA1cada686f4910670506ec0ee26a96cea24b9ce271
SHA256a6d2e08d96a942d961ee99075b852c07270b5969d35dc1bd1168f7b4d8699c2d
SHA512b7b771acab8913f82615c8151d8e20663bc49894ea92cb92733d344fee20b0474fbbfb31086110ea48007e83b62f1c51add197ab283a0646b96f6a7df1a36d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530b191d1657e7ee7361c68f24f1997ca
SHA1af16523e931834484dbce515524a06c19a6cbb39
SHA256e78df8ea9d9d63f4acf32fc189f4410179b9fdbf5917b9f9179c076991c7deec
SHA51281e555da9c7a957452e4bc128adaa18e8cc6346bab3995237ea8d1ffc7073d8612a7572d1153e147ebb92d43e59aad7d6f16680867562dcbc8ba3d67c637d7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8f62ec58e81f4ddaa0e3ff8c00b80e9
SHA1241c7523d5bc01c4c7a346559fca0100ea53b5d9
SHA2568d3fd862a803695fed4d914fd433425860e6d06eff3cc5b9c886ba2d1ae8b1de
SHA512a0889bc67311b841dcae8466662a563d917406728f6188f8eab5bfca4f39d3d38588cfeb536393acb345940f908633861f92cf1894ba397467b06972403c4c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f2122cc18a080f092da7b8a96fb7aea
SHA192e8251de94e3d7cbf0aef7c44a0feaf2036e4c1
SHA256d1c93900d691693c6c4d5ec2255272ab130e3228b78df2c59afc9556663429b8
SHA51204c147a321adce2965c074b9fc7e5882471bc5d6912ef25c6e6149b131a41221969a7b794d587d2af1f9c0b66b8d1bdd1903ad8431cd97067f143c46bc6479b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de9e05bb2a23dbe53b8f2cd1dba83bd0
SHA1636abaed95509789783f51734cbf586d8bdfdc6e
SHA25619f87592bb17fc0b28f357b1643d6f052d6124bccbf09a204563ce19ae6bcfb8
SHA51252853fa73680ab175f0e31f3178d595a2e0f9a138c6a5b351810e42d9a242e1419b2a9a179501c6c0047230d92a50098792e2dbbdc98fb91f8810b3bc1a85237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c393ad2d0895a03f072cbe1654a427a3
SHA1bdef05cd21165920c704730aebf0e64d293d27ac
SHA256622ca69fb6213adc557f5ba98e413762e33662f8c62640a1d460986c11b1c6d4
SHA512fa34a0a84956bbb88aa8a39ff2d6c5aaa5effb5bd966d2198b1b04f7685fcf2e36706cbfdb90cc92a9f8f79bc9b63ce52169a06363130fb29c70b00cf6edafaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b08c430817ea2f3ce2a1eab4579e5bb8
SHA14e153df1242ba8c02c92571f79c019482cf7f5d5
SHA2569ca7b1df3d49244a77c25b1951100288c5a6b649fc285aa1c8cfe1fd5b445567
SHA512381eeeecb55c41143f2e54a63a0ccf024e5ac0c490251cf7479568aa5ff18e34c54e6ee1e1f9263194ee64ee0f7d82ec57fccd40b745e91b8c493468aca03dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4a30e9cbd76dec07b783cd81b76d148
SHA180be7d963e2fe008f41e504f5d781e4bfde96873
SHA256a70ede12350176c13532836315ab30349075feef10efdf793b7e6daf39031501
SHA512669eba05b1d0069ad64f713cedd23662aabcdccdc385c2c9f92b4d219b55cc1588a517da6d79cc772a5beb0d30313ba22349c4708c59e31eecf68e50161b3527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f40be87c6dfa2a026ae8206b69274de
SHA1cb0d25292ab8c3134c3553c4755051b55af1e228
SHA2569a1a071075f3c5d8665700ec1618f2c421b04fa9b5e3b20a6dbbc10a7beb302a
SHA5128815cae9d871f3192180da7cd9ece21929df99e6f8aa6c71ee58bba4264a6cc5ff1569c1596a57cd519a8996a2b6ade67736a7edcbb8d88a25087124797b2795
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06