Analysis
-
max time kernel
67s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 00:16
Static task
static1
Behavioral task
behavioral1
Sample
1c3ae1941e632ef0a1e947d0793f52a2.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1c3ae1941e632ef0a1e947d0793f52a2.html
Resource
win10v2004-20231222-en
General
-
Target
1c3ae1941e632ef0a1e947d0793f52a2.html
-
Size
1KB
-
MD5
1c3ae1941e632ef0a1e947d0793f52a2
-
SHA1
f082cc5860664f3154e65fb63f3e25d69ce9e5d9
-
SHA256
e16d1e159b72a47fbb14fe53f3fc506f833ea4c96d34aeba3ac24daa1b96371b
-
SHA512
710517d5e8e937b748b11d0f40d7d61a868b0f9324656bfe0c13558726a64da065691d80dce3924ee41db8d797bbc6ae7943153d3642c15a2862abf8a33d6189
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{737D4071-A2FD-11EE-A2F4-62ABD1C114F0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103f91480a37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000048ab1162ab1c114360a5001bd394cfb70a86ae8b841c6e94781e48796b32a351000000000e8000000002000020000000304883feae802edf08abe82a01ada4820edeec9da277f5be71eae952b6b204a720000000a849d10c7d047a598b2a56a5b21f5fe70b7014c0a50de67006cb4e45eeaff9c64000000007f74c329e2b2bcaa1d2be74bcd79459f4ee6d08dbcf6f8f33e84856457efe98fa1e06d071127b3b2f8d4b8fd764a5931b21be328b9c1a19af6ffdab50a10bdf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2988 2216 iexplore.exe 16 PID 2216 wrote to memory of 2988 2216 iexplore.exe 16 PID 2216 wrote to memory of 2988 2216 iexplore.exe 16 PID 2216 wrote to memory of 2988 2216 iexplore.exe 16
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1c3ae1941e632ef0a1e947d0793f52a2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD596878bcb41e851d74ef9bccebfe97cbe
SHA1d05b045ef599c0b3f407983f5e27a981b577507e
SHA256f4779f2c2c1661e4b2580e8d7e880777a23a9ce80bc34bde23f6678e47c8dc6c
SHA512092ea27f87e6408487c35f297a25e03b5f9e660d05d77e94d04ffda9425bdcde99b5c2930f464c89d4f251e765e5d09b7f63ceb8998277feabeb500d399e968f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ba92b7b3c95681ea6016b1f06365d15
SHA1d053767c00bca016a073721331a2b021c1866daa
SHA256277e45bbbfbaf19ac7a65a14baac1be34272dee4b121403e945025f6ec6687a5
SHA512f2d742d33b1cbb3137bc3972f296d953033c46da4f7c0776c7277599219030b00da2b950d4cb14f21c505c6ae35ddaf990ac323f413084249e3e3e8a41a11402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bda915e2b8beac5b9e8f7f8f6b9e196a
SHA169c682573daf0c288668c49678dee45c2a3375a7
SHA256e7aa0c1bc1a5eb6d2f9a8ed6db7cca0288b1bcfce68a20b87e9c48e80ff8b07f
SHA5128d718c373730c9c1cded91b1bd77fef5a8e584a0363ac0d0709ea44cd2b08fef42bc5d582d9935aceabb89e1d6c0a9e53e65ad50fb6dc9844edaa39d64fbb01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505666546c646da8735fa47b50704ffb6
SHA16f9cf6748c9029f5f9334edc1a2b565d52ccd0bb
SHA25629fbb786bb029f75c4b38ea09974502106216a4906702d06203d3d2737b5c84f
SHA5129000c24655cd1caf3938813d24c3798a1ff97501c43c23821e9d16fa7a95a2e7659a64401b878b5ba8ed50b6f3023468aa38366e83168fbffdcf5b9e9a957c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b44b91bc870bbcc085b91e9f18a75d9
SHA1e4b09ea990c689bbd2307efa282247c2f2bf74b8
SHA256ec080623f97d338c157bfd6acbf1f19c9aa954c14fa42213fc8a76dcbbc8f1a8
SHA5121ab6c5f07e2c6bd76076f97b6f77a49914b94efe7d6b4e4af676b077f3a8c3978209e75d1ee34820dc0d3e75df1bebc2874a1da4e57389833fd489a0e97ccaf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cbceb74da5ae024a17caa09f3e27324
SHA1ead1228e31d61574e05f3b4072fe76a7a907c817
SHA256c7b5f7d24fe813a7b711b35535bd0120815ee55fd72094fe46b72a769a11b78b
SHA5125d20f51a3b8b005b50f04699e357d460efb414184dde8c9b0322e4baf24c750c13fec6b7fafcb9c70d0e34d7edf0a3f79a3959e4b0ee08377f3ec6c9c6b6b845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5090c76221c85775e1e855abf4d3704af
SHA1f8e247fdc8e377a14057a10c0701988b43459870
SHA256a461e0e2b33bb3519d819bde8e440905520d8acb8ec5c90dac32594e2c6feb40
SHA512d75402223d03f19e719821600fe8b182b0610b531dadca0e55bd6dfcd986a22dc0e65b3e9d7cddf1d36fb82cb5c691ad4fe0fe0095a429c251f3e61e73739cc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55816973a7803309ecc89d82098895a89
SHA118981cd14fca85473bc02f11f92400a1ebc6afb3
SHA256184eee2007c7d3fa0918b2225eb1ff15cd9fc142ff4df34530de5633fe0e0bb1
SHA51235c33a89c44e69f91f4f9748609a19945246fd366bbe8b6e4df4b7ce471bbc3b0676823974b49790b7cbd5424e23d02700fa7dc777300f723c8816b20cbc88ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599088b015c8bf019945065d85b77fb40
SHA105ad6f5c2688253777b9015a265a9bd1fe3856f9
SHA25671b97b3a0399725fecc4e143f286f573e21d28fdac5e9f14891daaae5d7c04b3
SHA5128d2075e871046bd07646430a4a182a06ea0fd8db11ac6d570adc0a5d331bf0f243c7d309c299404f586cf25226bcfb0f7e298e78936ed0005a1db6173b9df19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f9266a8ede5a35ada6073da782f3dab0
SHA185afebe24c8c1f74362b2df2f91ff17f08aab284
SHA256955cfba827dfa7934a05cd79b3a42c15fd665133dc09c2c556a41db2c30dd9a9
SHA512a5ba84ee37ac51df59a2b6775db2c643ec26dbe8c165d1bd04a8f3a4f27fd11f675138a74d272d2f4ba57a2fbd33fe6d86b73d4ca291fcc0f0a29b71f0db2467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06