Analysis
-
max time kernel
46s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
0d325704cd1aed8910679fd96a82f0d7.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d325704cd1aed8910679fd96a82f0d7.html
Resource
win10v2004-20231215-en
General
-
Target
0d325704cd1aed8910679fd96a82f0d7.html
-
Size
8KB
-
MD5
0d325704cd1aed8910679fd96a82f0d7
-
SHA1
3f90677f7c34a09a9afe4dc38c6d12ba4dcaa0e2
-
SHA256
e3713566aed929ee9fdf03da7c0eef9bcba43643864d0070945049583fba2a2d
-
SHA512
872c28ed757371355c446d907be3f92195567761b21a8a41e3e24b572df59fbbdfae5b0962c3d3b149b0df4408df485c5e33dfe716a8ba7a5aa8bde1936ca960
-
SSDEEP
96:uzVs+ux74OLLY1k9o84d12ef7CSTUFzfIOFu89lyaIsjMiIhO5IUFIDiL1I1xDRS:csz74OAYS/jOEtthbPPRb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F660C61-A356-11EE-A5DE-CE253106968E} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1032 iexplore.exe 1032 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2324 1032 iexplore.exe 16 PID 1032 wrote to memory of 2324 1032 iexplore.exe 16 PID 1032 wrote to memory of 2324 1032 iexplore.exe 16 PID 1032 wrote to memory of 2324 1032 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d325704cd1aed8910679fd96a82f0d7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5884bffb727c61ecb8696f682f7c2817e
SHA14584b0aa0342ccaededec0983a7bcf5d7189b3cb
SHA25659161080456c00cf83dab7ebb437ea00ed18e8630de1f7a1304f2dd9dcd79f6a
SHA5127122dc428a2ad706edba3e7ba2c145407d6a27d2fe301d5d247e327e7fc708fa245ff5058d0022e6d92b7757ad5cf335e81f7056a1ac5f7696199a4629737eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d5fb5b8641290ce7032b4003fb47990
SHA12867bb6bac35090470d324524253df95663fa23d
SHA2563951162fe36f45754df5ac2f5856d2cf29734c5e791c0186ca3cb6b98341d664
SHA51261f2eab033d081741282d6c725745fe72a791f178c1b4c583c92683a28eb06ebc61ecfea1b30cde907c6535e015efd94677940ade151f8ac15f06cf55b5ff132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5562234a1948ef59c7f7466fe83d6379c
SHA18889b7104a2b660d39c3991c0177651fb0446030
SHA2567508d82b825c72a0df462d8172c69c75fb488acf78cf2561cd98401a5a867f17
SHA512d081274a467e1f4b4301f82f69cbd5bec9199c555e6549c0257a05a5783d7d92d5aa040597ee19634c4ede86cbe5d9160eb6870aa18f2978f7193d7808ac5154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcde4ec1e818c1dc40c565d4901ffe1e
SHA190b092e2c4e6c9422ace07a78ed67dc60eede5d7
SHA25686b31f67ae613be32ed7f345cc18d978fc17abd8a79100d35ffb26529f59558a
SHA512b30a5962202e670bd5026c7c9fededde41008fabbed72f2ecd337f2579e22c61c88b79033ad20612b1214f0ada54e20134a3359b7e745505e3aedc2433bd4c7c