Analysis
-
max time kernel
122s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
04221efc802ff0fdd57198574ce4da35.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04221efc802ff0fdd57198574ce4da35.html
Resource
win10v2004-20231215-en
General
-
Target
04221efc802ff0fdd57198574ce4da35.html
-
Size
11KB
-
MD5
04221efc802ff0fdd57198574ce4da35
-
SHA1
03ead9084768a8cde3a852eae2c5eee3ecb5ffe3
-
SHA256
dde26d625c20374bf81384aef4a5370b970e32c4465b7275c66bcd80a6010864
-
SHA512
250ee3dc96e4d4a6f279185d07a23758c72f400765ecc03fc6832892e3fa2a054365621524fdf5dd4716241129bfcb9ea4df27eacd6634379b4b729bd38707be
-
SSDEEP
192:2VVlIsr03ZK8k/w1wvqyOBm9nLcCEXg01JauBuLbdU8d:sVlIcuZS/gcOBm9nLcCEXg0JaguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409790217" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC60EE91-A43A-11EE-91F8-4AE60EE50717} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2536 2468 iexplore.exe 28 PID 2468 wrote to memory of 2536 2468 iexplore.exe 28 PID 2468 wrote to memory of 2536 2468 iexplore.exe 28 PID 2468 wrote to memory of 2536 2468 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04221efc802ff0fdd57198574ce4da35.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509d0d981b5a937e06a8c7228be8b82e0
SHA1be7e20ed7c686352c42df921093c729ccc1b5b70
SHA256bf7906e85b0aba4a6a4e640dcf73a01c05f97df54ff7b5e3f315a7959c112532
SHA51296e2ef8edc22e28537f7f17b8dbffdf26cfc008927aa2a394a170263e85d75e30cd97369f0cf5c87e39308be1d0ef470d86f0f6e33e6d7c8b6760323507f4066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de2bd1d7881d6ed1e74724b3a8ec2fae
SHA1736e54cee8728348d87749debcb1cb6ffe04aaf0
SHA25617c78cd5394a0136579854f9cadd8f4dbeb4798b626d19f6fda8b1597c572c78
SHA512a22977f356841309c06d7393dfb480863d072e72f1a1ead8596fa359006deff3eb1e541678106ec11b32861380a47c4bda818ac7bd0b6b4c8e945e347d975ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7e05d7138040e46314fbaa3fdb23d9a
SHA11d32440176250c823529b5aaadf0887c85c94569
SHA2566aeb1f90522c33ef6260e02392f912371be983296ae55ff0cce491f18b612076
SHA512a782c9ebe8cd5bb75078a7e7ab8d2533aae079c67f35412689e4d2ed5ab22391a880ddce484ccb56499b1724c0226defc75e581f5e57117df65c27f48f331506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5029f40a408f85995d15af3cb531285c4
SHA1a67643e9ab0415344490532f8d4a4b3d2387097c
SHA25689455155a495d7e8dfac35db8c58ef7630991a02a4d3478d803b25d477784614
SHA51293a30832f7d5210ccc2db2c0ff4a0fb0377e0aa7803239384ceea6bb81cac08e9d0cfb8671cf984de8b69bd7e129527537d177818a03eb68956ea77c12ec0def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52247dc543e87f7a8abad7bf26bb4858d
SHA1097be94406ccc1f129095eaef89b7f09c006525d
SHA256562c765f3f919422a62b1875744151547cba551f966722d16b5c76236b94ee7d
SHA512d855dcfeedb10b1300d67a6c3707e150e685307db07c829a77488c48f6efdb1619e2c0dd3cbed7c8c7839d677c972f1deb41a8101870e48cedf62363824143a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f31d3145400f3b8100d5b218f4714f8c
SHA182e9852d6e347d5d288197bc68e0361cd46b3d44
SHA256270f788d1d20c6e836b69fd6aa098db811becdff78ce49eb5a1202378d02bb70
SHA512d75bb0bcbcc4e274cc3d82856cab808068087f0b0b6541bd87bbc1694324ff372b514a4f21946b982d021b643ca6a4e0c0c8800695034beb4f9526540f5c963d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa33bb1dc5445cecc4fcaadfcbcfae9f
SHA1c736d763922ca9b1a5f2a916f07b6dac636dc127
SHA2569cfb4f6066f03cdfa0e87d0e0bac9abafb0ff1f37d93b45eb5a7e9135453c1a0
SHA5123fd0ebf53e0f32b43d0352e5a97183a84b3f7b0eac90c6ec3fbccb19ec34f0d488bd013dd952f580e02b80ec97db76b0965759197106964d14e6c015f5ad22db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f83aedb9c7f69d01a470532dd6b6b6b
SHA1fe3f67583b5ba12a72ce9b377789e16e3861eda5
SHA256729c564faf4dfd2ee6e86fecda8b22aaf73723b6c65f17989fd6a2f37058790e
SHA5122a6f8901dec6e43131490b04e5be68d066023bd1babf3ce4bda1aab8aa2718044c2f35360881747f556beedc53d92b4a22f074ab02e1d0de88511c0740f16904
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06