Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
0125b3b737d77caeb331af41e51bc454.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0125b3b737d77caeb331af41e51bc454.html
Resource
win10v2004-20231215-en
General
-
Target
0125b3b737d77caeb331af41e51bc454.html
-
Size
44KB
-
MD5
0125b3b737d77caeb331af41e51bc454
-
SHA1
c91046e483e263f5f380d965e80179ea87842cce
-
SHA256
e57582ab295925fd7e6119e0bc5baae261b0431acd5dc89f652214633e79a24d
-
SHA512
091af0033905ee5ad01c0fb34c5e8d540f6c06888e1764bc5542a6ef9cf9b320a75085a31b363398f60c7f6d137eb2822f7b84cb942f3a07da9b9963fc58f145
-
SSDEEP
768:Zcd9QZBC7mOdMIvpC5I9nC4CXRrje6QPd:gQZBCCOdr0IxCjXRlQPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000dbbbfb501ea62772d17cd0ffac6ac9c7e68e6f5592d854b42e152411a0af5aba000000000e8000000002000020000000c0fc118285d1e41d6d5978b38f777a2bb6365344c6475fcfbff5d98c465f5d1d900000008efc0a0827fddc92a5930f125bc07cc4112456890c750f321feabde28676440abeba364e9064057fb83ca896a8ee9daff94ffb4b0addf80d7ee008b381446a5be9a25e1f4c8f12488fdcfa4543ab08ffc590823e2b7c264780e7f9b0fa71a287b5a9de194ea3535425d07494bffc6d28d973dfd07855c9cba0a4e9565e25bf7049f7c7ef9cea7e046e2075a47bd8f7bd400000006ee79cb1aeb83a1fccef169d1714bbeb1b91c0e7c390aeb28486842ef59fab293a82b60ed781f43ddd09538b4e89d33d76e1264c51919b99d2b66cf8e3ecbafd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{472ECC81-A318-11EE-BA23-F2B23B8A8DD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409665387" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000007e3223287ec7f19252a71ca03ea7d6bcfb5a6b125bfd0f3399d3bae30d3439f8000000000e8000000002000020000000a975fad4029eab38c128000aab353a9f6eb9f8f5ac2dd50f244ac07c3647868c20000000744e19e281de759313634a96e255dddcd4adb4e60f0c3618cc7e80e44d63e6504000000087b26f3175c088d7c8f8c6f855c7a1e01ce67002970afd7cc34c11be298446a622684707df33d0583d930dad8d99af2f1a9dae3d5dea5ce30c53b8b3792edb08 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109f991f2537da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2904 2964 iexplore.exe 28 PID 2964 wrote to memory of 2904 2964 iexplore.exe 28 PID 2964 wrote to memory of 2904 2964 iexplore.exe 28 PID 2964 wrote to memory of 2904 2964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0125b3b737d77caeb331af41e51bc454.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566be4090bad5e13cd2612aba6cf8c4c3
SHA1c745b3417bc9e24cbd606588aee469ef8813e3ed
SHA2562a9380e49a39a6baf1d9b6b5d6461b011c20a93dde645fa1b3b44c5fa2cae1b4
SHA5128ec2d1dbbd92bac217f42e0c0a1097bd27c0a586f6d0a44325a1b40f61b1d6255d3a37ee1b7ae6151152e1348b5e9dbf7fd1c593e978bda45e533d6e33978705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554eb20fa0f5744a00476b2588f81a9c7
SHA12d4413a30866bdafae187d5f60d8eb1844488ced
SHA256b6e2613d5192aa048460ce224fe3e96a72ada6f8ad12f08aec6d3d1d67e10918
SHA5129738ecc43420ea0cd59de1a4926680a4edd1057c6c5342461b906896dd27064e468e4b6134716a070854d5927247e305349b4d26217280e052a7295ca5f40bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b9cf64838e78de9ad87a68855cf8d8b
SHA1e04bcb29d3643bd47fd5c6f49bf1337bc7c4faa7
SHA25667448f26139bdca1926da39167bf9619301977d39926585be22d1521a4875af2
SHA512cc9050f2064ba2aade9b744c7d669037536d052e490c118ba8852d4e7b97fe85b292a688911f35a80a537165476af69eebf11ff125d10107613b33f547a7cdbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c4247781fbd204c728ee7085576377f
SHA16bfd0676966a7e82c0263d7e071ecc075822ddf6
SHA256baba008413230fc5e65888376c6e2104675ba111eb0ac7e70520397ad0720243
SHA512054a51bfccf80ebf47e2144d94c080c70c9f6ad8a53c5b1c956e68fdbae47869449d7578bef7446efac001cbc6a37be102441ad68831d34276695cf85e837667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7381d70c4617e7def0efa1f94eda025
SHA1511bc8b6979f75fcf3b210397977f259c39adc5d
SHA2563bd817e174480e88db86df142dbc56bab25d3c2073cca8fb4da6a8404cb86bf7
SHA512540d0c7e7a4797544f7f989d2a20342d66ae59d1c46d702b0f6c97f779981bea0cba751980cb08fbba812f4fd9c41e37ec552a71d9fd38fe1937892fe472bf2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef386e8bdbc78b491631025607c441c0
SHA1a369be66c9c94d57474c7d565fb761ab99bc5ee8
SHA256cf456c979e91387a78872a96e4733fb38ed9819b85ab3c4a49cb5d90c43bf383
SHA5120d18ab65d9e55207f9e01b0b23686a79462d7ea5a74f61ad56a21202b796c47ede6eebf13f5e538ea0c7dd6f54bde98f46803b377cd14048485ba8b7332a133f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5246a5d1fd8596c86fdfa7d6e56a6a59a
SHA1618d94dc720d508b6b8395cf2badcb163ec96168
SHA256c319c1ad309b66abd71163400e9090e12b8d7b88bea1054d6211702d9ed95c46
SHA51233b547f490c778bab511a226733a6609eeb6e1f20188c1f9d645f230523922a28e9e21f3ace1ded099ef86dbd08cd13599b667df5cdf5896ddf2a1f3b60bdfd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5253b6a20d886a3fdbf492ba24e655de0
SHA1ad201b7d824f80a0317fd21d8e4605b1c031e1f2
SHA256754064309e59ff1777c9a6df195f068e8f20bff285ec87642f1ce92f360eff0b
SHA512c3b8fe876a7324336c0566df5a21d7e3fc6c022f32f92ae9a1ae1cc6adfacee0356715f73b2da2898fa75b42e19ad858a464d9df15beab12d3662e80821ac10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a93f5052755e9a01e8db40e128c2785b
SHA1f4664b12a569d564542048208770944ca2a52a17
SHA2567c4517a1651e630b8a9d493865f0f839b933a3df598518992a7726461d1e99f5
SHA5127c5ef997f42f33b75342fbe70298cb42e312e55512f4daf4a9908dd4845676d11d8dbb26ceab9e75ca27dbc9a550fbc50885e7e4f56e64085ecf7b18a42a0265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58600a51dcbcc411284ed8466fa621e5c
SHA17867453a125a44f38696bbed7bf8d9db3c43a24b
SHA25652b8ef41b4013e843769a2070cbd33c2078d965e477f659e2af486b7e5713824
SHA5129df9b6dad7c0350afc416193c7d2e35ea56a08d13e58e5b81021eb139b70b69b9a488b9094ddb8f3e68d009d0fef02a87b2b7903e50652d49cb5b58379c6b77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6d87c15b160a5b95ec68d10fa0cd1c2
SHA1704ef2dbcb6639a0f7a77b3273a672f1ef8f8e69
SHA256e9833ef378ee244470ed36687be7a4056859de4b6d979560ef235b2f0c81d9d7
SHA512513ba589e376d4aaa8a845f1a538decf76f38bdbcbce4ce803363acdf687d7aad32ddf3b3d1b0798307cfd7d0968505d9cc6fae32a17d371efaf07488e3d1ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5184209f64c1e6a7a89263c2fdd81abe5
SHA13a22fbb2aede210891144ce8e8d277df9ef863f0
SHA2566c88469fef7fb31564c41a327c142379f01c5499a69749404f897d7d6fce6c2e
SHA5126cf56da86a5f272fcc17cdfbeedbcc058f9af5b8ef6ab1a66651683eb63fc96d678ade45b518260c9c6dd9e8010e91daa2ebd2a9a7e07a0035a4397b5d91f20f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509a4ac1452d54d8cd9745b2a7119612a
SHA10e5dc1cdeb4ebe492990df31020249527817e8d3
SHA25675e634efa80fb7e4fa765bbb07513690b5ca4d647c1625538599c4ceabee6877
SHA512686bf10df5242f47761af0eade93e0f7048158c326e7c207bcb65f0383eaa434dd4c734445ccfa96c10486ff4e3b0a80aa896e518ef5ad9bec12f05d7cf7475a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ebe4040ae49a95131cd76d131478c92
SHA165ccdbc34de5b686e7a50bb4827c688122d21dae
SHA256c5606d023806247e466bcb7ddc11e94b6fd1d7c77271127e8f917aea2bbc3f6d
SHA51262921a07a769a5f846977059c05d4c694279d49317da3dd272e37526418472506a2023d6c1520de91c2b72e0aee3df51198e3e862e44310f52740a265c57dd16
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06