Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
06f5d3a62b473221ede564f64bd271b1.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06f5d3a62b473221ede564f64bd271b1.html
Resource
win10v2004-20231215-en
General
-
Target
06f5d3a62b473221ede564f64bd271b1.html
-
Size
116KB
-
MD5
06f5d3a62b473221ede564f64bd271b1
-
SHA1
219c65d8782d8d52f8a01cbabb0d74508aba633f
-
SHA256
e3ae345c0e34df5f18ac47347f483de63fefa84b68ed572023042222f443f419
-
SHA512
b98127bb58697d0eed7af620dcf4834c873135bd7253646f9e73169c8a104c724bed272fce028e26331003fdb753a9e58f54995c35ce7262adb46d94c68cfb23
-
SSDEEP
1536:PhSYk+Iv1ttU4BSBtPgP8rSHak/mO/O2avD7yfVESdAyfIB+Bi440MLW1D6lf3DF:PhSYfPUEhrz/bIh1/rWHY/+aGF/r/d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409809666" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34B6EEB1-A468-11EE-AE8B-76B33C18F4CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000004421c66d511ad0da195b1108e4eabade4c6e7b2309c271555f5447ada2291a8b000000000e8000000002000020000000921243aeebc3ab1ae9a52009b66b9586d1c36ce874ad1344f0f58d85f9105b8420000000c6440c270a2e496462a3e997510ff519dee310afd6e4b8ddb3a4487860d36b924000000002b6836534c2cb8b4673d5fafa3c78ef9f58f7c5f7a733977dd765d717d16176598d1c03cf74c875a227f3ad65680eaf422a34a024d4d77f00c29a2cd8091980 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 209c10277538da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2340 1736 iexplore.exe 28 PID 1736 wrote to memory of 2340 1736 iexplore.exe 28 PID 1736 wrote to memory of 2340 1736 iexplore.exe 28 PID 1736 wrote to memory of 2340 1736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06f5d3a62b473221ede564f64bd271b1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566b2618cd8b5c54219ec15a455771005
SHA16b792d3d63a107607fe8485fc3cf576759f12ed9
SHA256c7a2fbaba92289791841836320b13cf6c203eee804c7a81548dc6d21ddb1adf0
SHA512f79a67e835a644b1a69336e5fe6fa0aec23dcc5a22d4aa4e3514066c9a402dd645bae0808e1e57c74b38cc5b900070aa677d4ca1df7888248f6cb52a5c23aa9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5783e85b82b8da436269617732a629737
SHA11eb17a772f1638b65d0c9b1a012929eaf7523417
SHA2567129109d095dadb660eea656a04f691996588d18d1dd588918f9a9fab2f0fbf0
SHA512a02b92208d716ff4f2e03529a7d1730e1aa3f813bb878bd5a205482e2413f69c8fbe54d7293b9d0cddc0491c46ac226defcfd5c3663a8715ce8806f9a9fc0961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55749b00530ad64ebb5986c98d259a80c
SHA1cc53f02517386ca69b0b2fd155abedf8b7138732
SHA256d50ce7bcf8c5e49ae02bd34015863517debc49fa2f29d388443e47b17c15d04c
SHA5123814f1f5646d328520a261468cde6dcc92aab4d27a69e36eeea0cea9021f2a0719a1cc434bba74427d2601edfb393429ef76fbd4732a40ba8511182d18f73daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555ca81009592e8005e8a783005cd55dd
SHA1b82d61f67427f3af410c1e922a3ea566b3e51e49
SHA256020fff9181968e1f7006ec14d9acdce5469a43ddcdff2995a32b8d62a6612210
SHA51294567f1a75e341740f6f579c23f4a9643322fb2495a181510fd38d4eca3ea0b4eabd7a4c9745121c5711ab132ccf40273ddc9590bb353a4f326b6a32602e3826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6c5be5573183846a4f88c00d569f08b
SHA1f3cae489b348972fc9a93a424d47be515edafdd8
SHA2565bfad8281471db067a153cc218dfb09362a0ac32256fc86e50db1673fefb5c3d
SHA5122b5e981d81d530c07ca58585037c914141a0acbec819f0d761999c8aeea3701ffb31def9c31bc6087532d2c2d1c2fe231f00eb987ea51c1082989ea4bf314bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6d97e9026c9abe2365a083017a7826e
SHA19608236e26c794868d1fe71d198d062487f61ade
SHA256a7f4819d190a9d1b1b35040753150c6d6e155fe45b38d93465f70f1e6851da93
SHA5125933e6608144e36cac9a90feade2960bdb6b8526f56b4e305cfa5fd3af27fc29046ef0e6c80616d65549fc42d9d6243aab03bab6aaa45df922786deb3a71bb8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a2f32d7fe1b117a358e625a9764874f
SHA1a217a8e22ac16dc14f10a063623b7748a7b549ee
SHA256e35d35868a6b6d44c30c41c7807e96f8be132222f0cc8ed74876e6efc2b43802
SHA5126d8f1dd1579bb80069f85ec988a592f1544df710a229fe0ffaa3a63772bbad7d3a4bae8028d3be89264db37d053009a337212d29ee95142902dedc1f94113efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f92f0395bba69f852f47a28713f7483
SHA15183e167995db360bc9a3f611c6c3a1ce7c21632
SHA256e17d0875c6a347511ea6b574dff0107a4336be0dc377fc8096d845f7b6784ded
SHA512f4bfc7dea31afc127d1661551d602ca2d4efa8b1772179dddd7fd6185250398dd634bdf559c5895a8f7b388c07a4d4fa31f7e5b7f92c98924993e9778002f801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cb22321e0d359596eb76b8db2dee0cf
SHA13989aa8bd5388306cc984471501487920346ca78
SHA25667391697e906fc8c1b9ae002fb88be346345c10628b6ed3eca6a97c446bd5704
SHA5120b2b84f1f5b9493230d3310bc9877baaea2a9bd35bb74fa27bbbd6aab69f5952a08c69984f05ce41892235bc35f9487b61e24e4af8e0310815b122112549194b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7ab60515e38f9616e475bbc0b90edeb
SHA12bb112b9eeea24b8a217119ac5e3f24e129f3184
SHA256d47ef8b13391defdc26ebd295fe014f50bc9870c242b0a17201c3e6de13ba542
SHA512f52d03f50033a60b964615d79d0e43200a169acc8fc7553cc2ab35a349aedffeb7ca3cb5fb67328893559170609a5a8addf912ed4a1c2bf29656f9d3bb8dffe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512ea019dba24851e7ad7e18a0680e530
SHA1720476b4076835cffb937553d994ba06630cc83c
SHA256f406dac8d282f9568c6a08d02c1f4bcdd02a0d737bd4d333b7534907dc19590f
SHA51264f804ece4bcf47ee358dee49190442ed9357571333b7b001269dd383218e516e95dcf54d4d2812f906c266e528bb5d877a10c23f1047d7b8fc0ed9c5e7d0d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b94adc81959def577b217e66bd3d8157
SHA14eba4d4141605362f3dc7948861a5eea0683f0dd
SHA2567bbc0086e45c73603e645e58e329b01918b8bf984140121e02d9d1e2251d597e
SHA512b059b1337770386833de7e722e1594007f55ab7ca4dfbf9c5c17a64f4ec639e87fe1b10b270fd69596b50d845a4bb663546b4837b41567c587ef5bdc4afa1042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5633ce632871eebe553499a1694b47044
SHA1c24665accb0bab1b8906afec8d5c6a1a6446faed
SHA256a8a9962a292c02619918ecda86e43bc29fcca5c75f5d20f4ac17e45ecf248b4e
SHA512b8978e2e647121f32f635f74f70ec2749369c98094363f67986847e30d3f0b36537bb7a4bf06c6f57ffdf15ff6387bf81f9f14c06fc50d3ff76317b9a935bfa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56afb0640078c3d4f02749ce4f319847e
SHA1091cd716184542ee73b51f9ab9bbde86672cb00f
SHA256c72bc718f7a7aa4e7a9c7868a01eb2fb30f2189b5b0ba6c3a64841ee0ee3590c
SHA512adca089ba17fdcf987883eeb71d238098a2e04b36d72953bdfef89c145046822911e219d1b32b0c2797c831e275529429f21d1e573907105e4e6a447ceed0e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5173d2cbbc966ef64f489133b899fbf33
SHA19638c1554c60a487b811b15c01d65c7c0f038505
SHA2560f82a5f0ec0882903b13eff2b84eb9e1c1d65ed4a5efc6f0ab60e71add551c8a
SHA512cb78fd7b7b4f1bdb663315118a84f66b45baf1a321f4fa38f25b1458aa72763d39c9b39a6b772413eb2cae8f9e8578b4d09a93fbe9d17d141899c0159bb15ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51078a7fc490bb4a79f7503591310e3d1
SHA10a919a69c514b24443283dd2aad60ffb47e8f677
SHA2567ccad179d8d6dc8f32766f3eb480b851db6e16bb89049dd47c2da949ec4ef872
SHA5126b8ecfb45467b89e229678418ceb6d7ca248ff8f6b97a7e3df014a2ba5a49ee54185533c58b055c1b416a82c097a142e95a6dd71c734583700eadfbca6fdea6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5686dc6cf81adbd8c1a914d659fe61cd1
SHA15bb925cc48591dd7d64c222473fa8d753bf3e05d
SHA2568747d0f8b1639fd1970f7a02298d8377db5e4c93a2305794000a667d64f92454
SHA5120f8c39cae113344c247a85cd2b790ef651a8ae071ce7ae3644feb5c22323eb69b5ced2d6fe18504765455614cd4ef1370989d1441f07cd9f2c64f010538b6b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5237f0519de40a92b76fc45b3122147f8
SHA18b43c4744c6023a627a082ddc681fafe96f5ed2b
SHA256410caae07c4beda6dc6acc8a388dabe9afdcee0e112e407afb4586fe30020226
SHA512aec1abfb4610b60f9f8e30801f20f29ebf4249029c502c267dd226aa2052daba0fadbe579deb9ba5e92ce2ef9da1f792d16dfe147025d383e1ae082f1e7ed94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550d9800d9da30278dd2840449ca748b2
SHA143851d5d460115415e2eb3e970dadd71e8021137
SHA256a11147b5f6556f274b0208896bb9d497bf75cd997d46c01a3dbdb7644ffdd090
SHA512806d5b490dda6c627d42950976cbeb7711851c648fca31a80348c77725a184a826126ac09ad4b2e57003b3506eb1e5fc1ba9d15846c69d4a3e3ccc31ee6c62be
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E3F2LH07\jQuery[1].js
Filesize5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
Filesize
35KB
MD5f590458fb20e2ce7df0839a58eb58dea
SHA1d1ff9173e29c1903a4862f034bcd7df79cd83dda
SHA256b2208c9ff05b4574502a74553d64a0a7739d77ed862d9d2eb320b98415cfdab9
SHA512c4565c4512b050d473e3ba1ce3851e436734cf8c1e6c81cf9d07b0814081bcb318ec7a1d3f82e8b241c28c1ad4cb83ceb960c171169004a1ee08ad15bf8c4e90
-
Filesize
45KB
MD5cae17bc9c5d74e0e1142b20a7889efdb
SHA1cfea5f7d29a7dad0a1a25daf18a0cd4cb79cac86
SHA2564d74c7d252b593f92d04a5538ff5688a4ec720ab664ac723512fbcfa3f5ab691
SHA51242ba66aa767f8a15ce38f9e72990fe41e4fb2d7266e4334be0bcb7db7ac7eb38e7f3b424bb4fc5583197257e9fefc11ab19285f0881a054f338463fefb483dfd