Analysis
-
max time kernel
0s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
1bed396d31887b82fb67745a0d82f02b.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1bed396d31887b82fb67745a0d82f02b.html
Resource
win10v2004-20231215-en
General
-
Target
1bed396d31887b82fb67745a0d82f02b.html
-
Size
22KB
-
MD5
1bed396d31887b82fb67745a0d82f02b
-
SHA1
9b3303372a1da45e17647297e2a8444e62b18281
-
SHA256
0269815859504911c6643b2f9edb8e212ea8a4059a1eae76a722eac51e8bbefb
-
SHA512
f933695f9abb044130acbf753469298750101b4f555c26a17aca7a3c594af4c60b1b3fcde111f0847b2f9365b9c02db717cccd6785f8f35a47ad0f49aaa7251e
-
SSDEEP
384:I7Geh9xcB4SlifmsOSv63g7WDM4GgHG1ultBxA1:I776lTc1
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA31C141-A3BF-11EE-8E99-56B3956C75C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2992 2996 iexplore.exe 16 PID 2996 wrote to memory of 2992 2996 iexplore.exe 16 PID 2996 wrote to memory of 2992 2996 iexplore.exe 16 PID 2996 wrote to memory of 2992 2996 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1bed396d31887b82fb67745a0d82f02b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:22⤵PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575671241dce961225fe03b9bb038ed58
SHA1d254b3d7de06b578c16b7043d5b3855dbdb0bd91
SHA2561c0fb060561e7c2c0966c6f3b14ad726b7863bccdb5b8be02770dfa592450a41
SHA512a16716d75f28fbcb8cc03f0412b8abe5df76f8ecf8a480b593fdbab35575d07875b598c1e929a41224f658144f3df5a92df4c864976f2d54cf59b5b03b39fbd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf2d92da7ed314a099b70093e8a54029
SHA1723a2436a997a145ce56ab26be174c5b8148adc8
SHA2563c643720ccfe40885f209ee86dac87aaa03d96c071f22f31ae17d3c8bc8cb906
SHA51251a5435a1797c232b11a8e5849f97b6ecd5cfe78f106d4e36b4e279066c866a5b8e1031c0f636f6cb36477003bbc5aa2d7a9e713d43ee89a4a2f8ea25b9d47d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512745cab9c37bd8c15ff07391bbc6010
SHA1f0a46b84ebd5f29e88f14cb61745cd04d6655d07
SHA256b42edaafca034632d0d2204cabb4f663df82d0d36a29e40846f3b9305052e92b
SHA512933f66722328ea635812a043579996296aa4018b0ef1debcc7110e52800d01aa1e57afc77215fce52af3fb85496d65492a46baf2471b4752f9487e8d1c7d88b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1a68ec5520095c163d225f26e7ddc41
SHA146e7dbcf6e7980fc3f4aea2437f77169a2d48567
SHA256c0bc17b74c07d637b524cfce357266e6e56dfebb0ceb62f200b04eceb9ee9b3c
SHA51244e524406c343949b71da362990bb742099473a17be281db554a18a9b6f4d90905a0e6e26c207b293f4fa41750471b790d16ae0e10df69a2bea0a29367d19c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc910bbf5132584cdea4872673e221f1
SHA174aa1ae00e689f02475c79bb60acd6834835e48a
SHA256333a304a3fcf88e89b014f64c26ee980db93cdf15ba39a66343f62e469d3216d
SHA512a585846e84679e7cd74139ed824156ecc728638e0b01ab88ed9df73cbba500df760d45a7189057e098c73a5930bbac301b25d6988d8160614abcf4f86f0cb448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568a1d445d50e82aabc2125f7f4a82e83
SHA194d8f04b3c778e058b3b5bfc636d74662b07e25d
SHA256093f8d55e565ccb802dedd0cd656df47d3004bd9c5b4c26c2b0ce6444e85913c
SHA51208e94d6166d26ff8c315381bec458d72e90f1d50537e1f15e6502e3fbf62774c0426811a320c5e664fff3e375949c50cdaf01085025fcd0c9d3789981e511c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0e2366711e9fc376827629bbe15b275
SHA17be4dd48085f305cb50567138757ea31beb6a205
SHA256b6b29504bf1f5b8b86508de18b6cf8f943021e67ef351ae1be77db6c301ca1ed
SHA512708675e8e08dd8ecec122a24e54394b66485d1799a16f08075c4918f5bc270f3ffa3e5564c62c4439eba245fe7ca6633bda0ae2f1f2d869b20d4b946e3b2b962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bcf56390a66c740aad1c95cf4a1bc9c
SHA18dc1311a810e86379246e824bc02feeebadfcc53
SHA256ff2e119004d91dc76a7d9b7d4581aff10cf604539d0a6dc7c8b3cfdb30086fb0
SHA5122e81d5ebb89c27d63e7df5a20683f092d21d03e46bca5c2005cedef3aba9a10a7e838181acd2d2e0cf8d9b981e0c4a62bcd33756b0ca126a36ce2399ffe85774
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
45KB
MD5cae17bc9c5d74e0e1142b20a7889efdb
SHA1cfea5f7d29a7dad0a1a25daf18a0cd4cb79cac86
SHA2564d74c7d252b593f92d04a5538ff5688a4ec720ab664ac723512fbcfa3f5ab691
SHA51242ba66aa767f8a15ce38f9e72990fe41e4fb2d7266e4334be0bcb7db7ac7eb38e7f3b424bb4fc5583197257e9fefc11ab19285f0881a054f338463fefb483dfd