Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
00f3603fc50d78282a25e3901d84e187.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00f3603fc50d78282a25e3901d84e187.html
Resource
win10v2004-20231222-en
General
-
Target
00f3603fc50d78282a25e3901d84e187.html
-
Size
10KB
-
MD5
00f3603fc50d78282a25e3901d84e187
-
SHA1
1b4bac5898128bd876bb58e44399c549104d347b
-
SHA256
0e706725d8649e65f162b76b7e77a6811ffe2479c9a49360a94a795d79a42d7f
-
SHA512
93a9b4f942ea75781446d48c6e2a70a60f153a6b6c3d9bdb57276f6fe0863129083fdab5c9eb7df4382ba639926a94cfbe3cb1d0a48021735ca88b138555ec31
-
SSDEEP
192:cjgi1XM5zStXg71DU1dAN+D7zD02/jW5wWEdqL+d/EzhG:cjgiFM5zStXgJDU1dhbDr/K5wWYqL0EQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409767950" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701cf0f11338da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a0000000002000000000010660000000100002000000043fd1eedfc97a51afc76d0d5f7092eba5639238adbdbaf7749507800ad085641000000000e800000000200002000000086b1f86ea8f7c1725f7023f4a8477460693921a7dfecbb7631545c83de65fdc2200000006cd3b26517cdeb3f2d564665e0f90267666d1669000e71ea1963a247d69fff5c40000000c26d2f2b58efa4799e1497ac010b30a8855edd8a919883847325106282d94fbdbdd313bea29e0d559b2ed9420ff0e746db63b96ec6385c0d92ee49aba340ed88 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{149EF481-A407-11EE-95CA-56B3956C75C7} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2436 2156 iexplore.exe 28 PID 2156 wrote to memory of 2436 2156 iexplore.exe 28 PID 2156 wrote to memory of 2436 2156 iexplore.exe 28 PID 2156 wrote to memory of 2436 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00f3603fc50d78282a25e3901d84e187.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514d2909be328bc00ed1f9b27892fb5c2
SHA1b0f556976569b8e9b16d9c3a7e3550380a83c049
SHA25643bcf749f774aeddcfbeb1d580daaa925f47dcb07e5868b8c625404db2302b95
SHA5121043dab7b20f9fddc51a6cff235f06ee65a79252b23de28275edfa20a758c5ce129e9c2ef28e6ee4ebb59b4dc37916db96819134d8a446729187df940da7f39a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58047385210c128280f1b051a0c2fb347
SHA1b60ba82a2d9b9b560a0463ab129f6b690798cff4
SHA256217dd2292abfec2a19d4d085361c7616cd339b64acb23c8e99b5cdb08c220e4d
SHA5129d4a2f786effe25f1526b71bcf004d9666034934987e93b1124d811dfe649243003842ff816e286003c63b48b04c3bde89f9d22e7aed8e03f1462d14130dc824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ccf0e546c5ff87a6a726aef950781d0
SHA1ae467f1168bc51b0a1ec5fdf6d0bef2e44d78828
SHA256322db9a89601860725a9d076408a0c4a8bf5b8780e7cf333dff7cfd4a3bab7f1
SHA51218ad94bacf5b542a982d71f369762d65868de4bcc90042f8899c1b3b47047f7617eea440f31c88071f6ef8240972d6deabf4aa1fe6ad8ed0f83076bc97b6c522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500c3ffbe37f3783febb9726aaf2c9d3e
SHA146cbfbcda6e07369a9d996f166a6344f0f47e22b
SHA2561b5eb2d04f0ef55524ed46840d438d16f0c5c597f617bd35c31cb44870689c3b
SHA512afcb05094863e7cece35536ed941b9e4ec415dc15e89a70baeb98199c5f084775961e014ef59ea11586e298c1fac1470025486151c365797324c5eb2e7b9bd5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59309114afb1a9b90d7a657e77ca9d970
SHA1e42d45256cf503f0dfddfc4d847a2876d011f030
SHA2564c017a3d9056585310dc2de97450a1cc7c69cb91d20d6476520704dc2fdf5a5a
SHA5122a105d77ec1febd548830a84c6978a258ff3507caa6c563b1273a9a6e5e91d9dd43e7de4f6d47bcf95ed9bdff5ab783495e266424791c539d66f3408e9cebe20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c76b321c062ce611aba9447ebfecb12
SHA1cf57d77c0c954b4eb6f8db511131d14e10b605e9
SHA256712fd7d981a38f140c03588c147948a3ac5c2ec5441f44b19b51c151784005c3
SHA512391a7feec5a1f7aa5918d16cc026e4aa88a0b211d3dce387e39bf206caeece4b42d87f9b3609282f2831944de222233b317be001be14e09efbb9d3c6c7b99a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6f8d5abc2313ccb3748ea2c56ee3ee4
SHA1324720e59d7dbef33153120d069c93b5d744d5dd
SHA256ba34d76a3c41de80ce8488f93d57673b72a324f2e7988b040a6e17a61f075b17
SHA5121e4be011551ecffc328a15e923426160cd2563810ff5f7dc137ac47058aaf1083ebca0f1b31d3c578c25435235409696fdf7ab51dc902c3b61e90ad510d37e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa25a0d02421c33539c27a49903efa2
SHA112398e902124ea91b7d09deaca67edc955bba206
SHA2567c2d34714758832917b9026fc219727b9a6929c6baa30c561f0022ec8d59fe37
SHA51231179b5b4aed6e0add25d7c9b072a5bd2e5751486b3b26b4cfe39d7acf2a124c4894e22c578adee4bba4cb6c45e8e07b833c53bd9162f25a7c431a1dbd6220e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516ed025bc57c7c94f4b3ea3727aac133
SHA1034a141f015ba4c819287c239e85430ec55e8fb1
SHA2567b5c295b185054d40dac328a4b1ed1e03409dfbf705cfd60a51e596963c2e58a
SHA5126808d6aafc8992413ed62a91ddcae25bf6dc53021997a46c6cd580e39abefc8dcc1b2a731910374560ac0ccc6053f209a45e44a08ce34dc5f12d97fdfba7fecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544cebe93523913803d7280235cbfc6d3
SHA1e573c36b3c73301ab3f63e880a66a1e8676211bb
SHA256c778a99eff2f8574101cb2031cf179169014d6a4d4daf93fa7a41e97d1d26410
SHA51283fe1629b078ec637efef991d42493c3991d4cd030c7566036f4be1614bea137e96bf86664ead927ffd547bac9bd56e7367549d45b3e277c8aebc913afc1f0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec1d08b49867a9693997aaf21a9a0d63
SHA164788ab5fdef6ce7886307f8a18984d6a55f72a1
SHA256a92aa913ff08376beff00c33abc47959d658e1c33db25fbc9c50002dda080f70
SHA512a5b5517ce6507c50e1b75f2eb51b9887f5f4388265b929c018b7069f0e44be0786ef01c89423fba8f6907306d056d493ca88cfe8298a52608aa100f61cb516e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5067df30a1d00fb730a9302a6f94bc15a
SHA1e898daaa0544d511689c22fe9d60df648c9add7c
SHA256c9a001f4fa10e31e12d339c1d1be2ed7057b4a33d6e5295010d00d2c8a2bb45b
SHA5123d7cb2348ae160db5d979097a82656909db921e5758252d408e0702978a066caed01eb8a214e1bae0cdb5c74149935cd4364f33740b67264e15c9b0d565533f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5195508ad5deab22567c28ea83fd4df00
SHA10e6c1a56bf2432bb565e14c13f2e44a48730ae07
SHA256bc1f7ea87cda9c9b419dba49d02ffba550e9675ce17d54321b70ca269fe95a3c
SHA51200effa94ddabd5cf612937af1f465e747ce76697d7733025f4c28ed0ef02f7a5abc95fe51ca4a4beb7bd59815f730a5c486b6e88100e9955914cc047f8eb191e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574a8f216857885159a3b04de99d7d9d4
SHA1550ce077a6bbe38994eeade16b88608388bec6f5
SHA2565946d8ce3b3b30f24ccda84ae7f57767b8bfe2995aee017504ffb820fea6fe2a
SHA512a48ed8625be2c15071b8522fb1a6870c0df92df05d89532d189b27f629878673cf01126249e8cd52ce6f0e7145fd650fbc6401c9b4ec443ce6c74f3d2cebcd5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b404df418e5718bfead0855a85a82efa
SHA1d21cfcba8f642cae31243eefb9146aef289bef3b
SHA2562bb209595488e9bb5fc7cd5e574386fce0cc7f82ee29a95d21bc99fa0a6364f8
SHA5123e7c9c0b3d9bf1114f229e3568cdc4550b52f2e5631667fae4059868c2bae5fab0d3277b63980a42d7b08e900730e49b2803426580279dc495ca78c812dcd069
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06