Analysis
-
max time kernel
145s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
11818a2ad40f9159ffa6063a1a35accf.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11818a2ad40f9159ffa6063a1a35accf.html
Resource
win10v2004-20231215-en
General
-
Target
11818a2ad40f9159ffa6063a1a35accf.html
-
Size
57KB
-
MD5
11818a2ad40f9159ffa6063a1a35accf
-
SHA1
7aae31d3eefd0e1324e745a2c4c3fe2669547453
-
SHA256
e9270d67d286588cfa1434bcab98c25fc2d17aef7acc8ab2e00036a6820ae2e6
-
SHA512
b3744caab2f0bb0f1129b3ae93447b4143acb14f74d17502346f19b16bc40c0e965deb45cd0978f838bbc11eadd7ddcb9ae05dd46d15b5a0033250392c90ddb2
-
SSDEEP
1536:gQZBCCOd00IxCHu34f7fkfpfEfwfpfMfXftftfpfAfVfafOfUfcf/wfhfGfLfRfA:gk2y0IxEzcxMoBk/VFho9ymME3wpuzJo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908616977837da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e9178664000000000200000000001066000000010000200000002a93f3a38fba660c5b93b5e26e608ec4c066593b38fffad58a7ad1d4130553b9000000000e80000000020000200000005c49d445bd8c57e448bb17ac1e09d1098ff18e0739028e116dac446c034d6d49200000001709a3ac21c40413dfa571a8ac4923cbf7e1b8596a725a12323f1bd689ee6a2e40000000099f81b762f2bcb0beb7282a722aef89c54543c1d4d64ef305a7fc79dd4dca8bb27f6e3af18cdf0bf51e37917962f5dcc75cef08dd95487b0904ffd5773bccc9 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409701198" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A53F3FF1-A36B-11EE-B5A2-D6882E0F4692} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 1176 IEXPLORE.EXE 1176 IEXPLORE.EXE 1176 IEXPLORE.EXE 1176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1176 2328 iexplore.exe 28 PID 2328 wrote to memory of 1176 2328 iexplore.exe 28 PID 2328 wrote to memory of 1176 2328 iexplore.exe 28 PID 2328 wrote to memory of 1176 2328 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11818a2ad40f9159ffa6063a1a35accf.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a7d68b07b2f3b6a59459b4ca1835dc1
SHA197982f99762ee17ea57b0c4956f9510ad6a4d603
SHA256956eda38c0ecdeef6796560a4d66017c5da53bb8d21b7924d83da12f96dfe7b9
SHA512a4298729538ea1621a19d8de13bd2463f967e8dfef899c2eaf53dce259ed3aa1a71c37ec76a3919fe7d60135bd16f133bd9023fa36c8d7546c7ee159bf64ec59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d5d8230a25947e343aafcb0845ab631
SHA145710ee70f01e00def7efbdbd392b2fdcf336431
SHA256b2725fe563d30d659b9beb1405dd7e10f578375eeb12fa46e677b0e83c41c6c6
SHA5123f2a6d48e695332b859ad513c3868f078b0eb3bde6664205e7e893eba228b253c781c824cf6de546929b5876938589bed65d2f3b61a3106d6d16c284fe80ed73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594c3a897946dbc81e01055c993e1dc2e
SHA174099e35aa46e67fc7bf0a08300c9c924aeb0bd9
SHA25655896343e3a299ad13c68282c6595d7496f58980ebe2885caa6afeaca2cdf4cb
SHA51293e331fe4f8ddf7f84e949aeb3103f8961c2c7e6d61fac58e05e080718205da1dcb51d0e83ffebbe3adb91840e2a905201f33e655e50c952d3319e8d9d6adccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afa26cd62dbc464eda88d928d48ab8af
SHA11c84fa397f958b31daaa73ce95282a4bbd19a728
SHA2564397773854dacd3a734dbcec0ef45376bd90a1846bd721d2b7e5599277ae87f6
SHA51270603c2e6a8c40d3080303c37bf9e5f2b4ad319db2b9f738c78a4321255d6120f6d0cc7cdf2d1eb08d4c5dfd693cc1f7292389bc653a867bb88eada5f1344891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed7d26efd9affbbd6e8e75fbbd83efc0
SHA184f15325f0340785a9722d1d6fe5002e1bcef3b2
SHA256bec1ae9c9c04edc098d7285676d5e7c3ee73192bad5903f6adb46ac346c2a039
SHA512c57072c1d83a50616b26a7c3dc60d8e48b2df0bd72b9a824ca8de704b43f52d928efde230b17483408e07039944b643cfec93f97c086a652d7a7373ff08b2778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bc7e60eae776c902743cbb49e3ea5ad
SHA1f87fde5f82a1137c0cbec1919ac47c3d2e1fcbd0
SHA2563bd0fe133c9d9e2fe1c8261b1563dab939fe48fbaafced0f80c21ada6f470c56
SHA5124ffcd1ae85b52f9b8e94f925c0cdf1ce49355af8850efdab01d966d9ac8ccc9cec46baf1ae6301bafde116b598390fc8f6eefe85cd303947aa411c6df9a20450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58264b5c54378c23ff0490fa397a56170
SHA1c08293758979b2bf7a224dca50543d840fd5f766
SHA25606bae72a0200f7918551b8f0976d214b00eefacd71e4f9ec2f859f6c5ce50432
SHA51291d02ad131fa09d5a0c92ada1408096e1de2ff04515daa771d8169fbffd577c83b861fa9b44e06ba92b3d55dd93dfb17d21cf570dd8c0eb69bf81d0247a3c61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50355d338e7a6d016825f314f041d85d1
SHA13c05d5f26d0614616890afc7e7bea21e24160ff1
SHA25662296d4a7f4fb9341e15e4e808c15e1ef9df1d9440593f56466132d0aedc421a
SHA51216a3168279e971cc47b902f19a8e28a03404b4a5d92252fe2cec6a5d2af093218cac8d0b2c0bf287f539699d7339ad6aa34187d1c3b0626334c42a3c0b84a1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598838cc2a20e5355401217ce0c1ffb61
SHA1e1ff639b89363a3a3cc952749793936f4d636d38
SHA2565569670ad314d0070effe8ed0266b7c2c1c2467370dc95b3a2f2b03bfe35916c
SHA5124c19b0eabecc130133bc787fd3dfb2b6b5be77b8e67e7fb0c8e68dfa2ea80a3e69727f9370fa300ab20adcf7a77e3483a6e07ebeffbc15c3ef0c374e7062537d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffbbbe2493234af9d1b752fcf72b0d88
SHA1fbd00935bee36443f7958d088a806059842ca2ef
SHA256f39ba4dbf58df96c4db8e5b00a410fb0daa0f69b486b9e301b2e2fd557feb3bd
SHA5127b5f148454e66399bc77b1e807a69705066ae2419ef1cadd17b553c3635b05a427cc8de19f666ceaba3b5a2c1e69e522c2d3ad520de84e810f01adeddfab2be2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06