Analysis
-
max time kernel
137s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
05a1725577a931eea8a50e86390df5d9.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05a1725577a931eea8a50e86390df5d9.html
Resource
win10v2004-20231215-en
General
-
Target
05a1725577a931eea8a50e86390df5d9.html
-
Size
2KB
-
MD5
05a1725577a931eea8a50e86390df5d9
-
SHA1
6f31e63ca56a08cf98bbb7a8b6842bbb3d1d00d4
-
SHA256
88908e7289dffc9cab52201f1e67c6a2716b1d110bc66ffbfe1ed02e30d9b497
-
SHA512
fb9bd09cd1619f87df852866f68cc5a16b1134f171212377cf469f382ebdf45c9db6135796717699f68ef9ac44997ec5bb3e850037b74ae5246606e92afc0e2f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409801004" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09255DE1-A454-11EE-882F-5E44E0CFDD1C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b686dd6038da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d78000000000200000000001066000000010000200000007724ebf9111ddf035e99e9e7579d1e3ce29931e20a9c9c128d886c09bd0aac70000000000e800000000200002000000004af43bd3e09555bc7d35798436fa9bac27798866536d4ed72adb6b694d447572000000048db3762f50cd479b9486ad30b04dbac474f166f62240014e41836a5e49d2fe94000000019f4edf200a286d58becf3d24a394ec17431d477040d85b0548697687022e0f13e0935b79b2a90f3871f2ddf4823e05382eb6a69c783b33ee8aeb2278b8b7176 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 1792 IEXPLORE.EXE 1792 IEXPLORE.EXE 1792 IEXPLORE.EXE 1792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 1792 3044 iexplore.exe 16 PID 3044 wrote to memory of 1792 3044 iexplore.exe 16 PID 3044 wrote to memory of 1792 3044 iexplore.exe 16 PID 3044 wrote to memory of 1792 3044 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05a1725577a931eea8a50e86390df5d9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD568554221b4592482d430c573a579b4d8
SHA1b32e5b201b66555c609aaa87abc472708dc5b8a8
SHA25618d9b255d5e029c4a5240403be1d585473e14e36f7a4e8ba181127fdce6dcf3c
SHA5124672055f062ee3faba960079f237257ecc41cba125187a599beb4c0030d99201c0dd2b77ce09025246110c38296176d9a02455a0f27a34554f6bb1f1f2354ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52483ee310f9fb01c5a9a1eb422f5198b
SHA11c66b73b6786c158b448f1f060ac4e8340ac9936
SHA2564aeee771b7b3f3a3ea3d23edf0715d8f8bf76615e8ce25dc97bbfc200b7f94a1
SHA5127254dbef05e1ec70ac5351775818368b9ab0bcc6d633e74e6541be54ac1adc02300fd9651461581c20bc97a3778e56eb6acc4118f338267aff35ffb093adc613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5104a2e28e064ead472fe349d7927e49b
SHA150b0119ae65facc8c9d04257a71df0cba6ceb106
SHA256c154c9ccc4c491083b39630fa458c7d8ccb636543b0f982ba349c42a280d3198
SHA51244b3893623f2d2f54486013c54b064fdafda38dc00b98ef600788b1b2808e6d0fa66fb07a30334c11111bf3e3efd80677e40a04a35cf043123f01d312c0af614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bd07799e2471d0b26545ac6759ac766
SHA1db0e82616c0ddc07be7bdc11f20532b282031d05
SHA2563d5a9918648366fb176976a1348b7a4dc165a5557f912ecd5593cc8391d1b68d
SHA5125cc72b037b1161e642f8577fdfe38766d7b84e6e3b2b62f6382d2b1790b6acc11efe4e78560969292e3ecfa37a3721cd1deab841d89ced45f86728a372828734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d614c592ce18ad76f53983cb1cef2814
SHA156d1af70b38806702ba2b276c2b0547bd0952c81
SHA256bc6d490407367f77d5be1813001348126e815bd806b734987e4d60ede99b6f3d
SHA512e335b6a39d040301d16f8b83bc2f31f9208fe2a4e1cdfeed145f8bda5b916673102fb7efb3c73d0896efe6ce244654b6dd7852704349f6026a3a3d1b2e8fbfcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e531581b6cd1c1daf341861c79b6cfcd
SHA11a229d1e8eb4745ffb4e8b6a7d5597a670b24072
SHA25693c8ff01e6de409b74a1e74d32dc45d430c386fbf661088a858a1d6fc3aa1bed
SHA5126ed5d76bd86178cb744d7bdce4e72c0f67ba267eb70eb0b0f8b445039d201dcbf05360b55c7c81177bac355bd41023682a0035c386c189e248a12a13049389c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff124f1cadaceb9761985abcc80243ba
SHA150a1573464c22b0ea65202150f5a529ffb00cc93
SHA256381005243b7c8bddb2d16fc3fc5d67fb1ea7923b376e8acde8e173ebfe6ff23a
SHA512b972d7d66a7fcd6582b8f739884df4c9650755608e54236eb993ce60eb269959ca9fcd440304b03c5ee347279abc567ab827b8a177a9f84e8b1b855b762c5aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5294343ff455e457a08cd878a6d45ddd4
SHA188e3be56e4b5291d858eb72c3172e70a408bdbe8
SHA256e46bca48da56235e452837856bb82243104f1fbfa20209f2c0de72fc99182114
SHA512876fc3a4a78c0906bf90c170442fb9bc24e0ba0d591b3617642240fbe2c2f67c00280b1a4a961cc6b4beea261c9baeb4130592d6888bad6dbef49fc2c425d619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4eddf3663aacba5d7613f37d712fa9f
SHA198da9f0ca06504c6147e5c59a0a23fcecde68e74
SHA256bcac9d400468c292ccff274f95e36521f6db90506f7fe527f4d1584ccf8a5adb
SHA5128e255bd8821a89a820c36de5b63cb5c14a0f1032fd30be36c078e3b797b1e97facdc07d2c13f78123eb2fc2becb475695bc78335e77280a331674105fd99bf3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3255bc7dd05082ee3568c0f87a8bf3c
SHA16aa5a5c9a3267b6a482b904ceb33dcd4f18a4314
SHA256e74290c6aa58254d91a34a3ff588e56a3826cb7a203985a27a1adc0a32a90998
SHA51293c01c8b7798c0d39d9953351ce3550662877bbec632b81e9a10147281cf817033e6e472e7833ad6464141dd5bc01ea49b97ac2a1b8322c983c43697331cbea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e86b2ff0492cd56ca2de6f31829da33
SHA1fafbb5dd373e6c69dfa2f6dd5385ccfc0d785322
SHA2569a313d5ae08ba353fac337a6c8a300a2fce0c97286f784a27db61c49031451e0
SHA512d76055dc385a29db8200e1fcfafde9561b6f375f33891f198eac2c926c2804a3a40d46372e4100e09ea5243efcf06fe65505112f0555c42dfb4ded259fa30c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD546e3283206db533c6f8d4ea7235add9a
SHA1c0b5d6db01eac186fe93721da0f7c18c1bdb8587
SHA256ddde4ab7ba680d260f9669dad9da1f91cf150a788b5945bc6702c30f007f22fa
SHA512bf807c864791ed015377fd9248b7e9f67a91f07c352dd7c71a97b4fa2cbf06984f4c37a5815061f6e119bff78c8d0d8d36526a915485fa5da253660191498788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06