Analysis
-
max time kernel
67s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
0a0f80b484180bc16df58f7a18ca1d86.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a0f80b484180bc16df58f7a18ca1d86.html
Resource
win10v2004-20231215-en
General
-
Target
0a0f80b484180bc16df58f7a18ca1d86.html
-
Size
6KB
-
MD5
0a0f80b484180bc16df58f7a18ca1d86
-
SHA1
5f4a112dbb99df0dec7299fe64e04543d426fe4b
-
SHA256
e88483a4d470abeaae74600a19f8bbfe4b8aada03db9d65c6f46b250ea21afe7
-
SHA512
b3fb2b4951bf1785c250fb9e587e3168b524573b3aae662c38d24d7d29d375262ea92beec02a49dfb48ac661ee8024f6078847398efedfd0b250d590a389d780
-
SSDEEP
96:uzVs+ux79WLLY1k9o84d12ef7CSTUeIhcEZ7ru7f:csz79WAYS/Kb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a050e04b9738da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000ddb68dca4a10ba5e3212ea9a36f500ca4a4e45853ef12895c308150786bd5aab000000000e8000000002000020000000750a8cc0b07e180311036e9fb7bbcb27c4f2d3a43a635acb62c5976830bb39ec20000000d13753411a21d718f3f1a9f25240d6f4c136b3c81a8fd545d475ab1f11b7ecba40000000f0ea6060b2541d96964d2cc202e2e64af55b875f9108a9d4075e08060e20d89d85aaf8755e07c9ef19b044dc173d3f1fe6dcf506004261ce71de3d828112386e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74854061-A48A-11EE-BE60-EAAD54D9E991} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2280 1940 iexplore.exe 28 PID 1940 wrote to memory of 2280 1940 iexplore.exe 28 PID 1940 wrote to memory of 2280 1940 iexplore.exe 28 PID 1940 wrote to memory of 2280 1940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a0f80b484180bc16df58f7a18ca1d86.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8469f8f8f1aef113b2419c7f2e0a21c
SHA198750da252ef0fac07674020643d4843ee854607
SHA256de786bb252e2ac494637d02e841966c7e208fdac94dbd0ee556c83798a98cdd0
SHA5121b6f842c0dbbf089dc6964ebcf231fecc03cd82e521fd4346fbcbb30ec0c87d1d338cabfe695e770efcbc81bbdba140ad6bcc8ce47b6fff0465bd2815ef53163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53378f5e989e25c30794de5052ecf4185
SHA1a06323817cc2e6db520096d29a36203cc4551bcc
SHA25693b62fb586e3135096801c7e34203c44be39494033f62205f4c40149d2a6c958
SHA512cb4ba614072397763a65d2813ebbed59b7ae68fa92f51f5b8cd4a6cd5cc45733aeefffba7fd943c04f346bc55731d811b3b2996597b7ab678a7eff501fa0d2ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5144086b4bdec70bbade3e8ea5133707e
SHA10b93a65f55eb390fb8d9611a227820041e3d7ccd
SHA256b7a5b50224213f04387c6cd5eeffb56171afc961686cd2f141e57b0ef6831391
SHA512073cde1b6e09e24bd2d91e78bcd5eb272b1b490d863ca6f3cd0d68e64e5c9366a114e2ad369d08b1ea49a6ea9c81e7b8e2c89448fd4f86163991506c4f7d845d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f5fc0a988cd7ad6ffb606a57127d6f0
SHA152a845a22e1f52f80ee5ee6a24b2f6cdf631722f
SHA2569ff28cc2f161be6b678b01a97379b27801a23fcb7f0836bb1859907bd8c6ed32
SHA5126d456129853908ef2a0b490124acc445aab9e3f1cbeffeea301da229fda9c24500c99e60e40a4a441ce3b3f0b2d700584b2b580e9e362e8acf530797ad1decc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f01f296d3cce5c991b6c4dbd0e5ee0c
SHA1601669a73e03343a387c4816cc118fa47bc8960b
SHA25694069b9a18331cadf52dcac46105bdaffb1bd264fbd04fb7c7f32d7f66188f2a
SHA5121d40520692d2c641c2e0aebfe2e3f8d73a18a0a06d9c812b5e9b101c487b16596bdc8e0c706a915e286c67100c05b0714d57ac90db74109fb7cb172ed2467dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526227e3f12715fd4c47bb7537ca49f25
SHA126e27897eebee5fd00e5fbd35c0750c2fc23814a
SHA25631f6890b18cbf8e29e8f9c7116e8d4ad5d43cdf9aef8b2bfbf0f45553281a4f4
SHA512686dc5fe6ecaf668c9ad27b4392dbe75203e9c1c8cc9c038bf0f11cb1ade31da7a18237c04a268ef2c7c9f22c3a42760678d8696add10a908b163ce5eab2e0ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fa5eea8c639e9ae090f23971dce432e
SHA1b03d0df488d9004521575d541bb1c2f043e62cee
SHA256653fc4e470649d60d3da33f61fac2815b1cbae280b0cc61f07613970128da26d
SHA512e6424768083a6655381468f3a2b8e950083a0cd18a64a8f881a01458d5f69ec2ff3707ca4357b860c6c209b10a3ff60e50cde0bd418775791645d0834f38f5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a833d497ce96cd772691de66abd3dd72
SHA13a348b23ebe4c386dc7212f3709997ba8f9171d2
SHA256afa63fbee0dafab8d0245622ed0223b664bdedacb8de8e0f589435036812b297
SHA5129309b4fda64eb351969b1447d9b9184c1d81378516477c285155e91d777523393ca43d6339164e9dd7ab595012088f4f3fca2b8b21523bf10259af0a954b008b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fafee868e4934af223d322a7671cac17
SHA17dabc810399453f285517a39587b7a4bb8954389
SHA256cee52f86fe5dd0fd62e104fc45c76e8f5ea52c928a7525d481a4e040fafc5372
SHA5129bdf6ae247b156a36ac190a4185c58b51490e82a93ed689d098bd8ed3ba482d4bb02aaddbf311f9b8de3ed117cddbf207b5a0708c8a8b7e7fa833ad12a696788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562340c3c0150fd6ca39f0d5a073fd4de
SHA1882e23eed2f332dc85154f11a52d5ab30af2d3d4
SHA2568353c945e6a0cdf97b897f596a2cc872723640a7ca767967b118ffdb94b975af
SHA51206ce7e6cd374b10f0d8689faa3f54cdb95ff25a04998951e85b94935cadff9703534831b8ee55728be39a3daced79bc4339cdd1df3a643ff5bff5d289926b780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fccf29a428a826604685b6bcafa9db95
SHA1cb1fc32c4b4803114eb772ea471fd99ddf200d55
SHA256f800f3dca6367650b6789e4a9e2593515ec672a5eee9c5fba6502debcda2b25e
SHA512bd56a942a4d8a7c8de0d28732d2b77f528d90865588d66c707fd05e2a83efb2edecd60111c3e034453b4453a23b054407de3cf776e552a8ed762d1334c851a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5242d4c7dd05fd83f54682d6059043190
SHA15b448e10120645baeea1221660cfb3544ec5e111
SHA25636937c5daf7c42b8105b9fa3f21c16b8ea00be1f46603063f453a5388e848731
SHA512abb30128d3f7461e416c6032c2952fe590ce5b619d582b1e9dc83179e9ecf9b16d46f2bb062d5a7d6b1c4553cb24b412ae2788057e47d19a5eecd2397e2b2dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58404dbf9b4fb647dc61a90846ff78a12
SHA1d700adbf1efaa2d16d4fbbc52fa39d35ed525002
SHA2569858a324479ab3c97b86f8d1b4725e3695ff170b2c091b0994e5a6002b073024
SHA512a04846b25c44c7dd7c9c849dedbce65d0aa52d27a1ba046a51dfadf643b6a14303b20e6525df101f439a31e326f468724369ae4030af3ed91be4e2ceb34cbc44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5411fbad8297601dd8e52677e5f7305cd
SHA1a8610a2eb5295c5afd8177b76cbfdd80cdaa93e7
SHA256319d3abdf58bb7d80194b878a7641059f0cf39cb50c509a024cef7946ed96764
SHA512d5d3b47609749e4e0b5376867a43c0ae18907c9d65e84366de0ef58e94be101a2f80d42b659b6b9cd4a219d7dcf6d812989e9e6c384b0f19fcab6c1d6b09f73c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5981c6a92082d2dc0e681d4faf5943bc6
SHA13b01dded9e5ceb5416cdd2d36c316345514aee7e
SHA2565f7a859031e6c9d3317f5a8c854c1fcccfb505b0409c61a58057cc31d55c0459
SHA5128894eed6b2b6dc35b5ae6f03c98ab4b311ef863a18c850d154b027b13d44de1d68c3bc57189da26a347f0a3b9a753ec1bb81c6d7f272c2d63ed4db1d58944472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f27bc45d633f6267be7dabb29e4d55b
SHA1643aa64b1a332ea8aefd300a8145207d07887eba
SHA25637c8c6a419f66bf86621886e02f29699051f60bada81b1839d4995fbd263a8a5
SHA5121fb97c4235972a21bb504d11f23b7328ff06e943440046d4e7dbef13babbead7a92e5bba7db53bc2cd5a40f37405e9da54ef0ec315178a91a83e1f78d010e8da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5544a1e4581eb81bc42cc426845a16137
SHA16c113d9f95b1abdaf40ffec6e9c8a7f5c2aa818c
SHA256c55ac4508f082e3fbf3f959cf95c966b991c3a74ccc0aad88e268518ec40825b
SHA5120db6290d052c736a3637bcc18d584e40d3d726c38ad4e6552449560766f3681a28a5ec0e84a75e1c2a6018388e38ed4166f7837113a7cbefa23dc50bf23cbb5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7859bed2b5ad2ad3cae371f59928b42
SHA1622b4300dd088a51b9b92ccfd2427f21edaf86a6
SHA2561ba5b29c52be8e51894c3e50014efe238ca45c0319a24cc24731079291c35fc4
SHA5125a87c02e77425b2e6c20d59657239cbb1adaf3670860ee7e3e161eac121940ce561f90397f0247e300aee56e19e522325789dabc4599eb4e8cb27639cb90378c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562a168008988d65b0adddefc7bd74236
SHA193dcc49823dc5351c66ac46391c93179477cf5f6
SHA256f7c2a7b1a0a2aab86ae10195161719fc50ee19f862a3a601aeba9f6e115d74d0
SHA5126c52d868ce6cd37007ba4fa40ca674ef81dcee6dcb16de8447689ae5700071ded5b32cecc7f5266026cb2d6d60334f120a12a28abafe89d3cc9a696bdb319738
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06