Analysis
-
max time kernel
121s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
0e65ceeae326273dae829c5369e87b1e.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e65ceeae326273dae829c5369e87b1e.html
Resource
win10v2004-20231222-en
General
-
Target
0e65ceeae326273dae829c5369e87b1e.html
-
Size
3KB
-
MD5
0e65ceeae326273dae829c5369e87b1e
-
SHA1
958743e37c0b3a5b75e03e649e88da4d4f087121
-
SHA256
37e97a9f75dbd99d3cb6e2c2ff14563878969ead96415b31fd42e79a95791b40
-
SHA512
64f5c96c8fd364ac6e8cd665e4f82937938a5b73ffd00b5ab88d45e2dcc68a3b92cdb531e56610ce3a254acdeac9f1f5ae3cc62aed2248a2dcd899edfde83ff7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409694532" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2168FF41-A35C-11EE-92C4-6E3D54FB2439} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6097d0f76837da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d30000000000200000000001066000000010000200000008857724a1c3abdf8a284338823b59ad577fb24155649daddb553228712d101e6000000000e8000000002000020000000a11843aba28a58f0c521745a07570054747ec12b049313602f1be84edef23ed520000000e12f987560d910f1456b5b4e8dc383a6fbc17f6a1aeaee0890d2d5bd40c8145040000000fd8e09dd87600bc0cd99dc8fcd8161f36be1357ab22f2eaf7c0117a7bcddf721e4a69441d8ea529d5908fbfbd99bdb1ef49b45f24f576d3eca93fe61d83cd9f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2284 2532 iexplore.exe 28 PID 2532 wrote to memory of 2284 2532 iexplore.exe 28 PID 2532 wrote to memory of 2284 2532 iexplore.exe 28 PID 2532 wrote to memory of 2284 2532 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e65ceeae326273dae829c5369e87b1e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eba9760ea77766cd310f6c90fbdb27ca
SHA1432d564e1cf120f4083b5637c32b0614af7755ff
SHA256d534859c70f01a50e0bb64fe6445813248a6890179ba49dd2a236acd8ef242ee
SHA5124a5d5722703a07ce090a0c655f647111a2d3733f5597a17a668bf2b508babed342ee1eb1bd0714d0d4f487332b050f8c4efb77e432c1fdf5e70fb57680d151c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d8939cec7bd7bcd47688a69284a95a8
SHA17eb7957aec6af1fb57902f867a47608013698ac9
SHA256c4ac93c843c9f9220712c2fc4ad85eb8699caa412115e0ab4746a61ac5bd8d7d
SHA5129cdd92b34a372708ebb4215f4a2d2148502e174956db8a4ad95ed240ae2948fd661c20d81bbc8b61e1be15e1e49b034ff1133e2f58d406cced64df66f96c1079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad116fae0fd9e173375f24c8e49226c8
SHA1b60b7b993149737b3b0ab19dd1d4cecff1b4255b
SHA256f4a341a0f49582360d7624a174068609cd73e29228f39532bbbffea3fcfebd21
SHA512a85a7a0e1a388dbc82481e18fe184ce1182d9f1c65b2fe59f5d27ffae2e0784494996332a415ac4c2ca9fe42967c608fc873b6f28c99ea475b0902f91eae692a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5d491109b1e5492a58778ff6f9560b2
SHA1a51329a3893d0674c2a78392260baa81ea7697ec
SHA2564ca4eb5e89320d135fdee2fda49aeb23ce56938d9c4b97b6b5de943394eb2245
SHA512e0909cf41c62981cbe0adbda33e58dfa060e0966878c6277ff14fcaff04834e336814da3d479c8e7475ec6a9d64b9d89280f652ca64208cf41c35042677f2eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561dedf669cf80109bd716fa03210521f
SHA1e0bf97e53b50c15750bc6ca81b041f3db76dd071
SHA256120025273060fda61269513c1d529e5d0c2942e2ab91535d16ef379ab3b10cf4
SHA51285980197cbee10bf8b0c034db36ce2ce4a7648bb75e5af58d95d3940e0db57c3875542e34982f8d2eaa2c01fbdc47cf67d5da7a93a9331c0c042e94cfdd317b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5235c82cd1f438b30f7905778ba2b9efb
SHA12d12ff385b8d8c08a55eba716799b44fa5c01aa7
SHA256c6c7dc58a47d436c1581ad40c4c9eac28f4209e1c79a056370635c5fa2f87170
SHA512b46a732521c04f9f2bb98f6c8ffa48fc7e60e4986957bf9b4bd845ee9cbb073ed2bb3bdb3ccae9386c54ccbb5ef0828e29b09828b3b5530ba98d8081b523ea1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a289cd187599ea9c572869daca2763a4
SHA16193bdbbecd5b7e493109e54ea46dd2e1ce11e98
SHA256ffc56f7ea23d4e4cda219376e2cf890ba7db1fa73e29dd8ac752cc0a7a556d91
SHA51255935e67337ec702e65c91c751dfeb7d44017d3b48430bac7dd597fdc11716e636ee3cf4db673c5081de52de830950ff73596a080478f3c2e5195543d7530268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb6d479dd1a026bd8f49e563efd65f9a
SHA1034c3e2afac091447eed2bd92ee5cebe8228c92c
SHA256146aafc51fbc3fb32ee5b5782f0034241fb9358b90314612feff1a5e62e103d6
SHA5129eb778bf7401bdee7eed595f15b71d412adaab474139fddbbe2bea61a9d8316e443adcfbb0569524a232a4ecfe1fa7a24ae577c5ae2876b702b743313230b9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e26c2326c9618a6e98d8ce88a6fa7bc0
SHA18326d05384b92d0a8d334577bae24d8f125babef
SHA2565e942ca18ea43fd492a271c476f2780a749f5973e67152a46de5b287a235278d
SHA51235080b2005ebd6e42057a73fdf4bedd926ac6be8f978624353cac0cb8c9ba0abd1f0e223525b5ad418218df62757142d95238bd827630d81bbe2c78c91b63fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6e29adfd84a8e23def138f653756bc1
SHA119bc96a2438eabd25cafe286605ce7c58ab789d2
SHA2564955a80e0adb2226a93c05a65c932ccc0381af5831564d40da83dfbc560570e6
SHA512fb330605aa9c07f0c9bccdd2745a9356a327791486f4a3f458dc0e13fbf3c686d1916763895059110c0d1ec9d4e477d71ce0e5013cccaa0292e020f4f4fa911b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5663ed2567e130dcd74547b14647f2cff
SHA17e357db17fe1b1c5bf1440ba8e3dd4194d433aa1
SHA25672788eced826cef0ca016de892ac0c95c08a036c237c0082b9ed258e981e238b
SHA51236d2d4513af244cd959de8f38e0a868e7cba24b239b070c9ffe25ad0f85e28181ec7757fb481b1cd208b3175a4ecd78471695faeac431181cabd29cce72e1807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c1f7fd1af1e5325af6293f7a465f8a3
SHA1ad057477b277742ab3d9b46680cd103f0e42cf9e
SHA256ce3eaef52539061c6730e517908eaa8976b00c6a426ce17e3a9371791221e323
SHA5122f9e5dde6aa004503b502e5cf9b8efe436c5ad40297424a3605e9dee6e7f699ad015be64508ab7c0e94835c28b759ab993a711da85f12eedb6161d1579870bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d051a89c79bb5796ab932e791f6cc710
SHA1cf5d40e2674bebd5beb9b77024d1bd8ec0b15a92
SHA256c2a09a44bcba0da419155c1b90d33d1bb602bced06719eeb632517e143668e29
SHA512a9bc247c4ace7305d4497d0ce4beeefc7fd1bdbef4df14824e5af6901a979089b72545f46bc37de37be0b164775aa35cbfd9a660c818daf36d8e00a8ea23f09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5397b87f57ceb1c8481e0b2b1faed7536
SHA177d9c47c50f5265ade18d66171c313f6ba812284
SHA256813bf3697d27297a116df9214682a5fc4765033ee6b5d0a2d1706fbe36dd1ceb
SHA51237d09b02e6417f36a7bbf9a1b828ea52195850bc9bde0f7f78c481e7ce80dff5778171a348ab2b4de6ba8947674e0edc49ff95db5469a94714359a729f40a868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d51cf92a1e42302bedf00d8da654f45
SHA185d087ffdf6b23df9d506ea658c6356267c54ece
SHA256bfd4ea41f4febb5bc97d204d613fb410d71e56f74bb644a0549fc73835fdf167
SHA512672dbceb1cc9a9de0719569e80da8e7dcc0c72e5908bcaa879b530aa5262e2a94459d1cf6a31ae2d2f5fde8440ea2ae738aae978cab4f5313bb995d7a57b3843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ae83b8c805b62fa22d5c066f7aa3a90
SHA1ebd3341ce793c90d40fb9164a59d2f54cbc2c0a3
SHA256110686d5c921256fdfaf05435f34fe16da9537559e7896900243dd412c5f8617
SHA512e947bb558185fd51cba24004372176d643527588c66d8431792b11a362eeb6a7db38b113272c0adf171535793ef5da0eaa1b6d85f529fb03e431649da6f121cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2ef0847c2f18a6c87a239a422cdf87e
SHA18b62eaa2318e7f9967835580be7a65256a7451b8
SHA25669a3a8cd2256ab46c7753c0380c0cc10fec393d011cdeefa56faf86694df5b1d
SHA512214a12a4f5481214569578247d39429a4849609cdcfd65a7bedd71d82145105a64043eccb0d9b3c4044f9b4ed27af46896ec2515caa5bd7a05e63ae16b7a2918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543b76568ae266938ece0fabf7a986e0f
SHA174b59fe63966e76df46fba4fe7897b69f0071bb0
SHA25623b5f82bb0dbd944278add09b793e2bedd58258d76f84633783e9dad81d6648f
SHA5125d8a5108d4b4fc8f5dae7e9abeb9451d9e5fc998eb2d5db9ae3faf1b3626a3ec572bec13e8bdfe399ff65cede1d9b303b6aa59dabc9cf796ae5cadb4977f7159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514693df7dc1afd7c5d87fc8d1d8e74f0
SHA165cef4392c16ee8d9adb2640e5b7a1f76a5bf12a
SHA256199d009373f6672a11026e481e7ac99e5d9c366ced830daf794c98e78d560e19
SHA5121821d765368ce62020f3ed54a7cd76186b59187c76f87d4a406353e26bf5d0a12e9e549134e0f6cdfe6ccff0c57e72316bbf25a0bdd4d7d86a64ba6eb4054b84
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06