Analysis
-
max time kernel
118s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 03:16
Static task
static1
Behavioral task
behavioral1
Sample
=?UTF-8?B?UlFGIElOVi5odG1s?=.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
=?UTF-8?B?UlFGIElOVi5odG1s?=.html
Resource
win10v2004-20231215-en
General
-
Target
=?UTF-8?B?UlFGIElOVi5odG1s?=.html
-
Size
5KB
-
MD5
f3e5b527210a989fcef0a71f648d6ff8
-
SHA1
5df855e70dcab7a46297e6edd1b31828984391f6
-
SHA256
edd86a949a6af7606053a0d3d169e038d5d7a1bca191fb49c234c4da1107f35b
-
SHA512
40ae9561b08aa7ae6d84d1176645c0b3c818348bce923354331005636eaa8e0e00d330843c63d0906aeeae2936956f117014073a669a5e638909993c23b506d7
-
SSDEEP
96:igMJHkHGbspbibqiNrCR5aHpUyQ96dMntUhs/EPDvntHTrfn84dUJ1GS4yS:igIHkHGebibXY5ae6dMntssMPDvntHTb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409668184" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8181581-A31E-11EE-9853-CA8D9A91D956} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000ea4728019bb328215f7054e9e4c0a9574c4c574bcbba181654b8aa1e6ebe60c1000000000e80000000020000200000000c21807916d82bbefacc168ea9352a756452dc16cef3fe9ebb4a3b161e72aa59200000001b9e2c58ac8d9d0bbe20b314c86292b8720fd6aa34de535731dac75c9e1a29c54000000076fe95a7e9e56c2b94f561afa25f4002d82b79be6f7d8805f16bb47f217cd467508338ad47d372ba8b2cf455945e38d3b87be65b08e017a65a7a3a71bfba4db1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50beaf9e2b37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1212 3032 iexplore.exe 28 PID 3032 wrote to memory of 1212 3032 iexplore.exe 28 PID 3032 wrote to memory of 1212 3032 iexplore.exe 28 PID 3032 wrote to memory of 1212 3032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\=_UTF-8_B_UlFGIElOVi5odG1s_=.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dac138a925b6cfeabf46e9a588aa110b
SHA13cb6f84c727be5f9efb59fa8e36485f1181d2e35
SHA2561ab19dcb7d8c17497a359cb07ae07305303e0ebfa052d3cb632e03067388bb3c
SHA51204c392d361754edb7e4b5b12e65148f524b3d10d1d1a862a027a9bcb083d02d60fdfcf0786c794236ccf68556eb02e549c773986d02004558e783552c5456bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb3dfacdbae8b9e211d78a3f7fe6f7d2
SHA15af025da04b5387b772fd610c528bdd5d6d7434f
SHA256bf1406ec13000b0ba70f3d8eec583335b95c905592192e10918c193abb2e4a45
SHA51222c5d87d15e21904ba1d49521016d01d890e753466b9a8fd92a576e29812836f27ca01eaac22a797671d2be7bf488a03f5ec0f173ed218b84bd7edc1dc1f6012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b8c7d82315e0e0cc71886f90f5e1924
SHA1d1cdef414f23c274164b0a7ddcf8e71ba6110cf5
SHA2563fe53d24c300ffbf069d2928ad1de9b0d74d6a25b6ea98366db05cac283b35e7
SHA5127774e15d75d74997c3ba66135ef037a291095a0e97c089cedb2fc91fb4aa13fadfe002d42f6a32e3b590b287f1f0e46093c5e8dca4a63c11f9f5b4ac03f262de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8fecef1a6fafe42bde55147ff4b096f
SHA1089bbbe540fa3958ef3d09e8c6a404d1e6fbd3cc
SHA256e8885bec81e1fa824c3013fcbf3a44168bd6d5b8790b8bf66991ff16fe1a66e0
SHA512a2fec046aec21455ee5acdbe2517b438fb7a5e3753537443102c78169e959f04c2aa23de38ec2e3d4a3c3a7867a1b0f3c11b7d67c2fa70deb22781ed23cd8a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5f5c50fe3ef12032c596da12c6fd803
SHA190f8a3dba86ac30027801e098eb3a5889456aa94
SHA2569e2a6d96369133054cac1db7d5f8caffa7c34e1e177bab18582ff1f013e48ff1
SHA512d8ddbe2498b3388f3471467ffaa7dbee3675bd9f5de55f09ec7edf04a34aee5232bbfead2f8efa4fe9c8b233e2ba9d9438ebbfe3b422bd599f627d3a7193ef09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d018caffaa6aadde24ec52ecc855073f
SHA17696a9225e37677ff789ec63b5131347ff0e851b
SHA256e8ed2c6b84a7dcda8d388833186ad4e0e4cdca2a3e4031948f0613ebed6c5aa3
SHA512b22be5bd1e1ea3680e2d6f6b17a759f9609f25f0f056771538ffd42a60cd17a830462bd1293944b5e502b57e6b9822cff16128b1fb8a34fc7b437472b07af301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b120d5aee7db7a265eadc2abcca734e
SHA1a2933b5081402c62b4a55245bc6287a38c020ed5
SHA256970e24166f6378a5a8b3734cfc6f7b403355edf2ddf887cab10bb6a1b46f8f37
SHA5129616630421deebe847c1907b049aac2ba0d673bf42fae9b6b0f62d6778dc02948d71c7e4b83c0c8d68c8924147e8051374258ccd32166be8c6b9a027ebc8fe7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea895ecac7d7d05a1d9f291922f8b0bf
SHA17510d3d3ef5f817c79f1a6338403ebc8aa4e9486
SHA256d81359a4d8377138f0113ad09eb8472ca329e6833dc98fc277e5c7d1d43a9d97
SHA5129948f44b87a5749b971a50f2c8f35a6175e7694f455327fa682dcf333c938063f9ce03f7e9d1e7422859369aaa7ea025aeb3ce8ab7ef8ab3414149e415edd13e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546f65c868b3a3f394d987cab04878621
SHA1799d6574a1474704f05fc790ea14884f2128573c
SHA256d0fc0cdca53f3c372714a6875d252668ab26041225a1388b2e99d66842200bc0
SHA51252d2e8f1f28325f4e3666c7306b7511f4d337d2f085b142684b97e158f67b08a3a2014965f1b4b5e55e858409d20d2817d6a56d85632c8f3b2fb26752a6e827c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b9e2a6913b9e5973a72c0eae58d24f4
SHA1eba2e3655f21283798c7911a991181d59ad1a5af
SHA2567cda9250dbd104b87bb0a2468dd91d80370f05e5d99145df853d6fb8dd17be8e
SHA5120187d2b31d17757c7d58861fa66ff25e2eb3db9c9bf55779ce1c948cb6a934ea9ad6f1c5d2f364fb9020a191056c35d687680fd1b11101b9a9c2ba146399197d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c919e3204f604a447e0465a159caa0c3
SHA18e042d83e859d5d6e2eb165331924e373d060b3d
SHA2566df972d18c3bb01df8ca6c05d12331e38c0429c858fc07af7b95cd3bfb3e9663
SHA5127f0c4ff9548fea632121d32686a1654a47bbf45e3fcd63dd461d747a5621f4c6460abcca8af3183f163ee4c59acc2025df138eeff58818af478077e9e8c9f754
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06