Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
1f596fd32c894d335f2fd1589ccdce2e.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f596fd32c894d335f2fd1589ccdce2e.html
Resource
win10v2004-20231222-en
General
-
Target
1f596fd32c894d335f2fd1589ccdce2e.html
-
Size
18KB
-
MD5
1f596fd32c894d335f2fd1589ccdce2e
-
SHA1
2ea189cef11993f9efe1182ab84c4a0a41a246a4
-
SHA256
475eb56b9a6e2faece09a14a35fdadd5d943a3956b619abe86c4eb0b28b3a9a6
-
SHA512
dfeba19df337bc57d481a467656d51c9aa54645ee2f4afa5ada34d92359fe4afae84f903ddaca50f341e85f761b8ea4e95b155665524db9f26e6e0871dbc606f
-
SSDEEP
384:YpmT0PIOahr1AgdGgs8jMaztTLPAuz68MMv07e:GmMnK1AgdGgs8jJO8ts7e
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30c126e9f437da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409754630" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000db0fc9642a13d6cd8f0a2317272231b00cec0f2cab290936139d2768b7f4e6e8000000000e8000000002000020000000d07cda3e4d32ecdd44aff7b57f17745422321f7bccac426e27ed147e286bd29b2000000068d38c13403ad9eccc54869d8286f377e23ab7f37f2a6e64069cfabdd671d32f4000000028ed7829135a7c722245eb01029cab95f8b106cc0275cbd53646b24296ec967a30d341c657b9c002ac538e15d549f8ecb077bd485ca834fde5dd179b7f5edb62 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000434868f9eccd2234ae9f85888c431ef2bb83348603f165bb3a3b3c0768b36202000000000e8000000002000020000000ef5054ba78ef0b81701daa421681e57550b42d90029535da751383219db2d43b9000000037ace8de06c8d2afb4723061f96c5af69644fdd2c6829a58c55547ce46a0a67a2909081e29819afeb4b297da0a38b68ca4590f390e5e55548379f2cb9d376376a4431a211b1eb5cd236d0efe1d3f02c662ed5bcd63d24743ab6a49393b7fa4162f6996d1a936454d36b7088786d33b0fd3026ad7a2c3b7e90ff5fd59625ec8b2aab82617268a0cf35bb305ba2e6b7f5040000000bb48c366caceb6d34e6acd1e28cd284ea9c2d62dcaf2f440681616e91b9b6795a28a9fc895ad6ffff23f362c228e6b6abf0ba73503cf94c7576e6a61e15da55a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0EE76551-A3E8-11EE-B49B-CE253106968E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1220 2052 iexplore.exe 28 PID 2052 wrote to memory of 1220 2052 iexplore.exe 28 PID 2052 wrote to memory of 1220 2052 iexplore.exe 28 PID 2052 wrote to memory of 1220 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1f596fd32c894d335f2fd1589ccdce2e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a16a75606ce3fc1a52b179d6df66d894
SHA15251a0a1e3be9ab61181ba70758dff8a4f1a42db
SHA2568911945cc4b131535097dd83185dd65e06000d67893891bf37cd3b088d7a2b9d
SHA5126da46220016bb8a2ca20b98243c0e11f6be6b317d1029456041c7c2400ff392b5a8e41296f224aa758ced2632eb0d66cdb76ff8528e20947bdf2524992dc1bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584a79a94aa84478dce1a38bb74dc079c
SHA1230e89bb7a8f16ed174b38596ec5999a5d5ca466
SHA2569088d687b3c4e902543dfec978a12b1475e7db353390af77e16bffef678a5ab8
SHA512d0d7897eadb5bea4f2cc99bbc46689b629ae744680f582f312b14a2050e413fa0949a0295d366aead99a25ad8b3728a8ffc89cfa49b9be8e1a096b3f9ea5827c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514706a07d213a3d448f713883fbb81dc
SHA186aa47d49d0a75cda84d1c0a75e9fb777030de4c
SHA256905d2bc055d6245276b40be19599a21ffb341419a50fe4645295d785101bec1f
SHA512879b00efde88711ee59ee515b94fd67c34d28db9836506693715a97351f4ab994c51849bb82064fca67f66582f65975853bccee2315842d6413a57765f0126f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbe983f7e89caa0234b74973cc0c19df
SHA12c300a84f509f2b0618b8b185cd355b36acf96fb
SHA256a975868cf4204ef19fc1ef3a151b1d3e77e90baefe23ef9755a0fdb9f04e53f6
SHA512e3a6df47cd59f80363eb2f14b1e37ac30f563ea2ee163eba8f1deea31328f332e1cc91fb7f53702df421439f8fb5908e21415c017c97e734252a10db670d849a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523980f12b74c9ed452b09991cdb9d8d0
SHA1de47f96a6c5cf86163871af58d0e23b89a558aec
SHA25696c7e7e5fbfd33a0d337aa41355efe870d4c470ce2fb4c9428a76ca9896d3324
SHA51231ffa5f70acf75d83cd9676985c1b9c7c4d3a6dd8811542c97b197365f4a61ef128c979bfbf291953cb0d5c70dbaa0d7a05dac2ac9c6d88e46622158861f7cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f42b5d954c4ed6ab83c8e8cfecb20fd1
SHA16819294173211a7eab4d1d750aac3f69b73c842a
SHA256960a35dac1c56ccf9458fa523ace6c212e5036586b823d6a89dc9c1910e55d37
SHA51274fca1f37f2049cbc8fc3ff70b6a42ad14130d811b01e03c188d4a1c3dfb837ac7f21da8361f4e8af733790493c8c770f33de54811abec4ef097fe51d2c76fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aaf9079252f20f8a5114991e83d0bc0
SHA169fb72aec863d092cfb8bb57151053660c7debf6
SHA256944bed1f2f8ffd6b8457b08984e2a056314e0bb85b9488ee46c219f29b475ca2
SHA5125c74f7f45ea0f269bf61ede87b5072b3cec4baf446abf2f38a4432b5461bf02ba81fdd2a3251c1613bad33669eac91734175bd119a44f0c1174f40f0025e5f3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5393c2950d4b6c9d9c6b87e0b9944a3bd
SHA109d509bf837dc10cb6f56e9053bfb6b98dd87cdb
SHA256c9c857c93001142b668e32a03bd87d040c42e6659688665fd69d2d65c51cff08
SHA5126f087d6c7d5478a2d72bc3fb0308acb6ee26b05abac64747bb74eb9a4e8cf213b826b04c496d662c8a75a253d76e03622c5a074ac516ccd885b6d98f7009282a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58466035bceac819e7f405dfe9e1fb26e
SHA1fa430e78dccf5483d38b41acb69f086ddb1b1720
SHA25695297e18bcfa34c8bc17e0de4a3b93efb384a892df30ed216648209cb5968880
SHA512061b489459c58fb6e43930f2f07e6650db077100f91153221b971aed94a55d693666701258fff515568c7831a179a8f65b5c1315d86c931fc3f395b1c44df7c1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06