Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
0c6e5fc136600dba18ceef5ae9879f9c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c6e5fc136600dba18ceef5ae9879f9c.html
Resource
win10v2004-20231222-en
General
-
Target
0c6e5fc136600dba18ceef5ae9879f9c.html
-
Size
11KB
-
MD5
0c6e5fc136600dba18ceef5ae9879f9c
-
SHA1
6f13040372c9840979c7a19dc5bdd4872bd466d1
-
SHA256
e15bbff9a6c1251e1033b54116a3967e77f91911c5f9a6ff4b40714ce58b7c91
-
SHA512
501a7f8dd27880a6213e046658ad33d1e1e62dde0a9ca8f9c049c4caf2481a7c6235dedb50e4582982da2dcec232e24757ea63026322d588585855db41989132
-
SSDEEP
192:WVqp+pYpVNoS9lbVicjWj7qS40lx6kvVTS+q0JMJfJiJJ15Jnpck3iGWvWVadki:Mu6CKxm0llb0BL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5801341-A352-11EE-9BDC-FA7D6BB1EAA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409690459" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1820 3056 iexplore.exe 28 PID 3056 wrote to memory of 1820 3056 iexplore.exe 28 PID 3056 wrote to memory of 1820 3056 iexplore.exe 28 PID 3056 wrote to memory of 1820 3056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c6e5fc136600dba18ceef5ae9879f9c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d59f4912b0c00077e0bd4364a663a0b
SHA15330719d0c3cea77d278caf5c70e48a1ab482e61
SHA2569d53bad7159f1536048b5355dc1201c3d11c4f6f9bceff7a8ed13a4705108e81
SHA512f0920457d6c9af2c6332b39470356a34c13f3bcf146b98492926e32aca0d298e10952ae633c26488d7bde3a8c850d7175f2fee14c11b4f65232a4155f0add5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aa7335304cb4eb8c92760debad20994
SHA17942c57429367d007571ebb2cf0e69a4dfd5524f
SHA256e8ae8570a538dbedd19caf8ea563f94a8044b1704e90a5d66ccf70c4242cd026
SHA51277acad1b65940ad817187cd38b7edc52ebc564c5bbc9d8b5b64d373d0de910754c097bce528a025ea91eb8d96afd8594dca000739c5a58ce3664782e3ba514b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8d65e3b04c47f0d3f29df408c77600a
SHA12bbfe89611a1f15dcc49f27de6062eb8d0486ff9
SHA25630f6d5bfbc2cc562d41abe671bb059c87202665fa8ec8f31521dbf76bda62f3e
SHA51206e4a51bce2d5f94efb68018f86fdfb1c83e63c468752ef9b2d8aa64ba950dc81a3b8b9250b9ad4ae9ce862d4d96aa322e670df8b11c54408d83f78180ff88cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e62f0cabab8134d1a70a694fec70fbbb
SHA18ca2061e0e843048eee624ac6d98d65fe042588e
SHA25663002e6c97d3e367bbdd3722cf57eca314081c8a778fb380eadabe71aba2a162
SHA512cc4cedb1b161acbfe8fe8f32a726f1b9dc966ac056c8c86ca0e96c4260a1268a1f33071722aca2c31538e6a274e8b984992e92876780c45636dba42987471eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57304ae2ccfdb1c0e6d08a23338f0fe8e
SHA1f16eddfda8e98c2aee79c22dd3294d7819423392
SHA2563abd4f9088357f1802d8fd6c979b53b742528260f2880cc78d5371c5fd622a85
SHA5122e20fa901b39a2129a1d480205c2850edfdebd0e9bb35e1368c5e45f0a84c31b1035aad2332dc1882eac35eb334f7edda4d5427aa9a731427cf7a6a081e5ec3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58068ffeda01a31d513b79b13ef7e9b41
SHA1cd7b19bb6c291a4f9553b012d34d3dd6cdafe9d3
SHA256fc04240a2281124200e733558326a337d6aca3113de513962ca29d8fe423a8f6
SHA51236e559aa9ed4961542dac6cf8e779cbaa0c53b737b9e5d90c83454b5f0ce7f6d9f9e7c1539988f208d601abae589adf8ce18c5527ccc1410dae4e0addc07787e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1089cc7771a312e56562fb057798c6d
SHA1bec8193463349fd83d50fa11dd8f108d438e441e
SHA256e7cf8699de6664a0026a2786bccecc101844f0152a68e2671f5b5e31a74b481f
SHA5129cbf271fa25137abe0f2aa883d6741b8b2fcda285cf3a12a92515fd1b771f62efefca7c3b9799644ca46ebede9a4bb1df0cb35297b3a9b0ae01c10d332c012b3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06