Analysis
-
max time kernel
118s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 02:39
Static task
static1
Behavioral task
behavioral1
Sample
0074ccf51d51f6d063980b5a59ff8b23.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0074ccf51d51f6d063980b5a59ff8b23.html
Resource
win10v2004-20231215-en
General
-
Target
0074ccf51d51f6d063980b5a59ff8b23.html
-
Size
30KB
-
MD5
0074ccf51d51f6d063980b5a59ff8b23
-
SHA1
bc58ed2cc66d84fc4c134f911ebc4f6202cbf21c
-
SHA256
0e984a00a3d01fc92560725cf1cfaa5a372b0d4cea6d81eb685363076f37ee0c
-
SHA512
d09357e2e6031b9e98d25f93f9ce8c4b8eb619b2ba005dbe31072e0f61e108d5f124ea8212611cef01e73077db58fe7639c415e2459f1b1ae2c71834fea0d661
-
SSDEEP
384:Lc98o7+4HXZZkVgyqs5JVs0Xqs6ybEBUjeTmuwa/nt1JopOFOy9mriBmNd0mykv2:L08uxHJwPegOzLNSVZX1vu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "18" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "18" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d30000000000200000000001066000000010000200000008ed7fc57dd290b0254fb8501e5e777843713c3a2a3b9661336b93b04960f2b90000000000e8000000002000020000000be85ea07de8b1d13d5735c966cada1d890e87ebd660c3e2c7a4bb81076f2240220000000dabeeabfe5dfe6e1cdf47fb0e008c5bfd88d69977114a60ed91d8fc412d05b7a400000009c28b988fef31a0dfc9739cca72cd4e3042fc35f117361931885540bccc3f1a6dc34d932f1b0804afa3b3f8d519c18fa54cba7fa354654e4d9a54709ae717f41 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409764355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE7A66B1-A3FE-11EE-B201-CA8D9A91D956} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "18" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00178890b38da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1520 iexplore.exe 1520 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2156 1520 iexplore.exe 28 PID 1520 wrote to memory of 2156 1520 iexplore.exe 28 PID 1520 wrote to memory of 2156 1520 iexplore.exe 28 PID 1520 wrote to memory of 2156 1520 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0074ccf51d51f6d063980b5a59ff8b23.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517a72a09f8f832cf96fd6e7dff8892a0
SHA10780d21633879f20b1ee3139b0c21014a7e87d4d
SHA256104272cef0c1064719f15c54ddac59d1d5e08a5a1747e36bf9568494b37b8bb7
SHA512ffa59b6976cd8be6f6bf558323bfc32bd5b4a42a1e345af15364a555af278c3312268199137a84f69902079ced30c86b899b7c631fbdbb966e37fc79264a5de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bcaa412bfe02fa15838d0ccbe516025
SHA12411c97c5a84c376ffc26c4cfc3092fe2657b7bb
SHA2567f6df5a18641bad413cfc931481890de2f9032b61f7c9cadf43bc57a8f12ec08
SHA51253e1062bdbf319bd26cf3f10aa426274c4a6b5e771b6d0479c80fff75e3f627d7578b0908348f072226de091e0d291c775bd9b10b1b342e0f1b2d1192bec9c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0d35b4ec6f46926db856e88e57892ca
SHA188877347665698db5811665546e18da867f65a30
SHA2569a5022c54df4b23f5d604fcbc50cecc08b53c4149d95f220707aa52e56bc7323
SHA5127fb711b4d24eddeecdddbcf9ab71454bc0b25c1941f62ed61eca76a827bcd0585a91d02616f6002efdf1cf1abbb44fa51faa6c02b77fdfac11f84de4458d6971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5450d9440c86b6f7b3aa72ad2ae336af1
SHA1786ca505a2dfbb955a99f9acce63c94d056ae762
SHA256880f0701ec89e19f594b5bc44e178c7ea58b452c85b398c5a3522a95cfc4de04
SHA512d5474b152cd9ce7a0055da1592f5d354831b85778c06540cc3f61bf78ed57666587c4445b9b68e64f31d03d4d8059d01059b3bd66c28d770c7186a3b7cc672c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea3dc7386ff86d55ad7dd2ead0c7678a
SHA12cdc325752a8165820e8e1e882f29ed14b4f7b80
SHA256dc576696c8cfb0b8d5410a50cbc5235fa0fa5b65d541271fef4f028263332e24
SHA512f81289c4f01573a23ef9b90c6f278d00b58c5f503e0cec97d9acb8bd80ece497b3da70e35207b1de0e844ee41e5803b142fb2c5a63004c10e72883932d772096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a6da3d332326b97894170d05d5642c5
SHA1e4bfe7f501613cfbb2c070aa18123ec4e350c8a6
SHA256ee17fc1d86023564324ea9f03de7f3642710eeca6f8ff9d69d0286ae9d08ee9c
SHA5127c25a3ea089838cc9ec3dea98ffeeef25f2a4888a6a221ae29fdbcfdb53556d4cdd5b9329dfe8f210809f7f0a66b1902a89b53e67cb1e421c90622373066c44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2901e201ea915a5e681ecc457d35837
SHA1b91744f57aea36dbba649df755771c785b0a5ddc
SHA25626c7b3e68b09708aa7e227205905a695bebe44fadc286d92b3bcf1f1aa6cf960
SHA5123041a56aa70ecd00f21e37fd8c2614e1b432ba26b6e9c65d6ca4527ba3f6e7839512d3ea3238ffb20c81d518d2cfdcd187689b87cd52feaa520984eac24c9482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5466ec4317cff01d6bccba087cb2bcd54
SHA17ba8f449f4e35a0a7c23faaba3372eed3e203ab4
SHA25620d91ee24aa50da44439b3ae6d948a844079a04eddd5de408eda7257b933c829
SHA5123117402d1f61ca3c59447805e8e4e4bfc56e57aa6f6a10b4bb5ac47417fe514cbc1cf4ab0825e0818b92ee6bc23277f6eb45629fb9c42809e34e9b86fe32f792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d71194ef8f19b54fe5427438421c949
SHA1ad07fabe6b2189903c6670dbfead9475fef95eb8
SHA256338d7246473ed114348e131fac26fe8b21f72d6f3210e0bc4b9ca1eb6cc91d7c
SHA512d80159749aa0d372013cbcb97de76b5eb7938e1dc4430efb3a4c6f795d19a09ae42bf9c7ff4f6aa38afbca714ab3080d3be9d96da883e1465c09a8d3e70d55e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0e00a941f6aa93d6f2763b1736bdf4a
SHA15be878c091f22a77170bfe7aa3e59f3f4af31dcb
SHA256f8817a4171b41b67ce6f8d80ac55ace17417468141cb2adaf369d0fa414b7283
SHA51288b514bc4e64522220c6ceeef1b8408b45ce09ac2e1d7abbaf175482910ed05723ccc5c668dbd3018f5e4bfa04963318658ab919faf7d5520d3f315045e49c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e0824ba30e488b0293e476eec1d5ff8
SHA16485892ac90a1bba08e0ad997a7e1641e490c5b0
SHA256e4a92c950d9f7fb596a47bb8ada4bdff1cbfe60bca94a23ab847795dfa82e6ee
SHA512aa1e5593ab4e0f69183e78c4fc73db1a3a2730aa41e3f435052260274eaf2dc0b9b2f7fc4b3689b9f406400e9b1a6f26af66e9f159fc1c63f535f3a68540809b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaa8f1a8107eb89f948df1320e868d37
SHA197041c9fca089f38870d945711a46bf8bb6ab242
SHA2564c0b0800576ad40d3d79a3626097c50c43f529681e2e41561d801dcf04f0d2e5
SHA512490f7f3beb501a73067296595bc4ac58451e03095f780cea9c3cfb1e93144b44e675095dd74da5fede422430bdeb986bbde549c4a8ed90e1f335f6ee2e01d13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9bf8182afcdee1d50f77523eeca6856
SHA11b5b779e7e65dd6595a10a4a5b41d07fc796902d
SHA256d178d84390da4617d955f14ccf24abbda4582a43291dd5c6eba90c524ec24236
SHA51299a6dffc23a96c03e9e27da07807da2d9ee121e3b97a6ac0ae3cc8c51d980814b57fdb105b5fbc1c4f0ca0ecaa8e527b7f677bc578cee5accd95db216552d9a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540bdd0b45d908350db938155b2427bb1
SHA13f2a0748a0522ee729d624729371e7469cbcadaf
SHA256137df6c22cb2c5c2afa18b7e88e530b27f43d36f39bdf0b8f7d55ad8712daad6
SHA51229516f071a62b3bdee8b592768ec228096bc120cbef1bbecb9b0d07218a7a43637454330e030316875fb6106bb8bb7273c98ece34255e5b559fd42eef84e82be
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4K0WM73A\f[1].txt
Filesize34KB
MD5177f413f34f6226df1a1d91d2958ea4a
SHA10f70736bd5035ce5f3ac9d3cfd65299cd92d35f9
SHA25671c78f0184044c0b81f320c30cbc41136049f84b951901edf9c36ac9949a3d5d
SHA512a2348d8193fc1a5fc76322956d9ed7925fa7af7e0aeb5c43a7151fc9974b3b5af7d815486551864b9404db36611433b70d4e7f3f5876420ffa7254840b4f050f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06