Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 01:32
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20231215-en
General
-
Target
sample.html
-
Size
23KB
-
MD5
da7b262dfa0b9842210ab99d511647ea
-
SHA1
7d61dfdd755570707ed431aff5417e47f309717f
-
SHA256
fff7192838701f4658611334350df90cbb0e41d2b8fd7553d391560e0e224750
-
SHA512
78021779254abc3b1cf32a6d2aa12b1c351523f38827c7a1a06655ccea902157e1f1244a7db4f17e7a91d0720b58b3556986f89e80090737ba2c4ef19d3fc22b
-
SSDEEP
384:+BIkSFpvsPvhCiiRzC1ORmi6s674xddJd3CR6y/1RFcvMotdvu3hl:+BIko98vtiRW1ORmi6s674xddJd3CR6c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00423d451e37da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000f93290bca0310f2ddd2f4ea59385a8d193a9c1f920ae44397f0547d51d49fc36000000000e8000000002000020000000ee9399bfa3ac8dcfca3ed9766fc54a6a5430dacfbed0cdb108a3cacde142892120000000d041058c3d149795b082b299d95f84644a82ef10585e706ae33c1b5182d16309400000005d39903b1ce11c5eb965be376528fadef0a55d1ecf115eb9f1270e6d24822f22809dda416928e891769d1e08fbbe5ef28c2b12f4d273c76943371c0ad316cf12 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6078B901-A311-11EE-932B-4E2C21FEB07B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409662421" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1276 iexplore.exe 1276 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2968 1276 iexplore.exe 17 PID 1276 wrote to memory of 2968 1276 iexplore.exe 17 PID 1276 wrote to memory of 2968 1276 iexplore.exe 17 PID 1276 wrote to memory of 2968 1276 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5242d167be0e49e46fade4fd2cfe9ade2
SHA1df2b89259024de67c456ba19924fe160b81106b0
SHA2568ed7da99e80ba31e8a0c3a82cf9d2e41da1759d178d024050d03394aa11a6433
SHA5124a1a12f85117fa7927ee2793791bff4b5d7cebddffa28510720c36d6d8e186e870ce804d2f36f6de95713b532af95f508c6ac08de072afd05d4e7fd8c07af92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54ecee0f811f301bb7246b78451c02085
SHA1dcf9cc4c6920e3077961d2d75aa8c0b6ed2c7c3d
SHA256e7e7b8d943c6eefd1d5a12a29974381090dec62b12cdb25395b844db02c42d78
SHA51245e7bfba02e507153c012344eda48f0fbcde6ec9ba8b148dd862adf40688bbb81cac04148126d818a1f0bbf3e3170b162ee6795a28adc82d2a3f44adbfd5b11e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b478ce03ffb7c25bf7e1ef6dcb1ed9a7
SHA17fc927f722133d081d5c9cc31211c27b22d8586c
SHA25634eaa28c9005adc09b261c0c817d50b1c981f102e099548f1742398f5137b9d6
SHA5129ae3162bc7596a4f31edeb2b6651ecf9b8c510e47a3e399efb31e6288bcd9259e0418e8f3990faf035f9557f999f7da815bb74fed344160a79b2257edca988e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5307f41c7a28d8217dec64abddc4a855f
SHA1823e232cbf54a5b117c6b1011b9ea30a3ae86e60
SHA256cfab76d17bfbe3ef9d047360ab9c7bf46f836ff7a07ef23a68136ac3d9014e56
SHA512610158bd5284427db5875c7b411d0f44e9d97e830bc24a60e27e7d1c5af25b6e9edbe12a0c71a91a3631dccb34fc2a8f8776959542052d5480ae85740a4e8e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc441e28509edd077e4447f50228e479
SHA1899309f4a3b75783736f5b36b94f9e19ca2350bc
SHA2564871519722a2ed2474a1ab3ee8abde48446bcf30cee6a5349d85c7f72cf9ec97
SHA51224b34bb97a012bab55f19027f319b4a2f5c2508a1e477855e306eb0a98d4a56ee844bd23d9b80a3c94302250bb55b245c9761564a1eeb5fb2e1315820d18b83f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525e9235b9217d52bade26aa7854160e2
SHA1972a8bc80b9c894a2504bac9acffe79b691ff99e
SHA256fc96f604fa11a7c3c5ac23d4204e53bc0859875e3368ea73315d96d614fae018
SHA512fcb4c86a5c3c013e3fb13ba818ae74fcc20fdad62d426a13ec41f6c4fea16f8e78783521eef4908473264d876220f041021d51718014ffa6b0c5ff9b954ed147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58726fc8edf013f1950d3232e17e72fcf
SHA143459a341744c2a28b39bbd44ccc958ab1790708
SHA256fff0aa8cdfdddfc0d1009888dcf7d17a8b7e716c790df465a748475fdf75fbc2
SHA5127c26da87b08e1b8b8bf495fd5a0d9a958857141b0818302b5966f42996554e37c33c89332b3422c8c5edc9570805387b577e420a817b3f04b6a668216fb4b93a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cf8f8949cd8ed5b5d15f23878f3efb7
SHA101e833fc7ffbaff72a89a6bfdbef7013a6010b2a
SHA25647b49a498c4580cc154916dd6840c5c1741c8d925da85f8f21ffdef898ce04c3
SHA512738c083481ca035b0fc8d54213142a63ed793fe451f321a47591006053737b82a0ed1b2edb1de280d8f51ba18422021442d18d41a41a41200ab2e1e11184307a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59852c2cd297209191e70db17ada3aad7
SHA1af68d8176d9905f406baa81d84342c52dee80c68
SHA256c14cabff022197608a036eb826ae6872217c19978c32254c89407513a27f38e4
SHA512055c3cb7229fc55a1df19931d6649fdfbb5a876d316483057799e80aec1a363b29c280e9aadec70684dd9000bff073f608aa57f5909e03191a1bad35533f9a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fa52168ae4b36417394be5e983b91fe4
SHA1b2564a827559d51d7683d5bc37062ee389f10520
SHA2564c12f53bef7f5cafeb3a0ac5e11cc8f9d50c3190c5588240c37079293f74008d
SHA512433b38e1afebb57cbb05659fc3d2d44e49c5fa279d08dcf96c6eba8014c0d7172756d5c275bd3383da4b858868b07fcc4f3f4b031a08304bbfbc720a04bc83a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52ed6f1492626446a166c3512a9f8d333
SHA110eb940d31766c9dc62a17bbaa600d3c92f3ec8a
SHA256ea9be441752834d173eb42b8804455427d3e412bfa02777958b8d095890898fc
SHA512cfeb40e8898b836eb07114f2a4f02b4fe4eaafbc2f2b6f47a895edb223a1081f0f8d6c29eb28ae2a27360e90faa69ace2be8a9fa0c1b1503b3c4503a9d84a934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EACIBOK5\Sexy-brunette-milf-sucks-a-big-fat-hard-cock-till-it-cums-for-her[1].htm
Filesize5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06