Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 08:36
Static task
static1
Behavioral task
behavioral1
Sample
1266f9e820f05bfbebe55fa7c9f4750c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1266f9e820f05bfbebe55fa7c9f4750c.html
Resource
win10v2004-20231215-en
General
-
Target
1266f9e820f05bfbebe55fa7c9f4750c.html
-
Size
124KB
-
MD5
1266f9e820f05bfbebe55fa7c9f4750c
-
SHA1
4b4e0c36fe3ac2a7be6bdcdf5f8702394b00f331
-
SHA256
8a0a2ce8bef606c648649626d700d02d1741bdfdde44db69a722af72d0271078
-
SHA512
e0d631ac56936b177788cdfc0e8f78271c46aef54dba9fbe6b1d5d907e084a69c74424411c47382400497f9aad077f9b6fdb6e04f3fb2a4a27eb879b81c0553f
-
SSDEEP
3072:n78V+i4x7CW27LqtFT66VrXbBNUGgpuo9UVcOJLaWt42:nc+i4x7CW27LqtFT66VrXbBNUGgpuo9E
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e91786640000000002000000000010660000000100002000000015a3c77e92950143ea45bc83e55e71c5a58af42f69710666fd2d8b0c6dbbc5b0000000000e8000000002000020000000aca844228c26bd97d4a3b4eefe903e8c1765cabd30979747eabb30705f93f01f20000000b7ebac940ff7fe02d8a06c489a65b03cccbe5a389587fd71d93342372b0dfef440000000e1b43b62e5e9cf8ea0c2330420a7e1687c1525cc8818e8a792a41b93c0025e486164c0ddb78de8461ed592555c2426f400af1d7e0f24af807320d38c293e1668 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309bfb24eb38da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409860381" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{489B62F1-A4DE-11EE-89A8-464D43A133DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2860 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2860 2192 iexplore.exe 28 PID 2192 wrote to memory of 2860 2192 iexplore.exe 28 PID 2192 wrote to memory of 2860 2192 iexplore.exe 28 PID 2192 wrote to memory of 2860 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1266f9e820f05bfbebe55fa7c9f4750c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c20973134f249a3dfa57e9ce7dc84038
SHA1819e94472380b62df787adaec3ef73da4968cb8b
SHA2568d32b7195064b5c1492f6a25108172a6485323e46939fd81f33782f7f26655ce
SHA512ad3fe08b15d7b45d110dc2e1b7d5e4d0291b04300fda1308477a3cee332eaea4dbe6df977760aa9a883114e3db58f2c081fe510f591397faa1769e2124517f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eac0d432590b81a19158a6e85a2580ac
SHA1ad36bfb1502849a87577c5331909c736b045bdc7
SHA2563915b4bbf7813818e81f0cd2001fa4ef11782f0d5528e29b6d2bd2248613574f
SHA512655f3eeb61d6b5c231ecadc4272dd27195c43009135cf69793eb708774095545e38aacf2f214555074af5aa05ab6b71f8f6f0352b52c1c79a5478ece4951339d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cda8ab6ea273f75830a089a74583d088
SHA160f3af0b2414a8ad6f17b213adc8e513886b995e
SHA256ce4dc750ccba2d420e46e4da33b6965921bd31d98e9abb08683e4fff701262ac
SHA512a0e9e4bfd0dee3fb0958ad95882fd670dc614b186b6dfe95c7387230531bb3980f5c3fda5412573810be4a91c8db7d1db85cbc81aa7ca73d8f58527eacfaff59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7c92b4aca92c6c76ca86be976468226
SHA1e8f88631382f0d8eece6c050edc1684f482b0ae8
SHA256804c82f2a51818b86a0935ddda8e681aa54ec1d146ebd45fe5bda24d467254ce
SHA512bf0081f583a2a5acde4e215b3d1f5cc0f060170a4a993749421c68ee2873aa246097e0efa79217f1c8ce56048065e11e21e879d8e7e7460399522931d0dad53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e0f155cce0df63ceba3d5a8b5adc5da
SHA11a954d91ad2830f4812157895a5982005b031262
SHA256b55b56c7bb28576d323c5e7bad9c6947a12b365c4e3a3187c0d39b951931bb90
SHA512dafadaf67632dae26ca2dde64d9d1dbfa5ecfad2127f9cda2c6dc5a9953890448c06cc722085a242d6c26dd64810e3cae766d12b58761c624ff6fd01203a6bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b07d52f55089a0603947eb391bcfe6c8
SHA1a5a8aea604ac0a9c61b0e3510606d14f5042c7b1
SHA25624425055c1d8e20f4be9dc3ea64c94726e1c6d820058c35bbdbd3afef3455527
SHA51220f8d9a1f5b48cd2c20c203c94ed013513709c2441f18ed595d167ef257450438ed24cf2fe6624c9a92ec6269b4d5d2ed7f41fccbd46e923aed0919d7a4c20ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1128aa94614d5dc843ba5fa63ce11f5
SHA18577f4906da45e267b5b3591ed0488926b6d9e88
SHA2566db87d1ddc60446535edc85634fb938ff5f54a57c3a58e1e0cb31f7b0a317215
SHA512869979bd8209869ac0cc174a44e13ed08eea8a05c3d80ade9171ffa6cfd5b25cf7461021bf79cc6d9bb61c852df8ae11c3606613749c7b33b0bb013be2590337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50af415aced229eede0cce20c0a528bff
SHA1a772a387ce406817895801528e419d3ae5721b1e
SHA256da868e7346a1ef2303a74d99ccaf8e9745a9786ca4e2e33ee1b20e3834e1413e
SHA512b18161124938bc97e460be50f4ea641170d7f6a02209b65bf0afe8f88292c737856ce0e7acc606bb5c22b457d6722f0ebdebe07d2c198de82fd0e7756e0223c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c376d9f89418881c3db437df2223ee3b
SHA1c3fc37b5d7b778100b42ef36897fe01c289f8ea2
SHA256d0e53327809a01f2d54ce7799370da1282e9c5b0ed86beb49df8c554518656b2
SHA5121f2be8c531f9963dd686038588c30423ba3766c8ca003b14d23ed371bd6ac3f607630da7a8712b441c8415d8974e2ce6f041b7596a9447e5fdb08fca77eff74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c3ce8e583bc9d1b5dc77f6a41d20617
SHA1cb30fb1469e00e0ec9419aac70f804639defa146
SHA25629cf8db65b7b747fd257390d220ffb5aa6a85e72e3a4cf7c3c5da5482c233d4e
SHA512e7edff4acac0ee1454ca5a472a7f743930905b86f5468b49e55a606d50fc2cac31900d10ddba1c3e0f8363588577dbcefa65bb609480120db4942c0289b3e65c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52eb25276fba5a285fc0afd2d5da48161
SHA1c282c17d7c7972f50b3e95993132b3d8ef42152d
SHA25616a4b496dc10587a7addae54144514a1a61e9b9561019614b8bd26851356069c
SHA5124d01266a225a97180c5466cec87b2b39bdb1da798d7b24e250100297ce190e00404919aaed0897e40e7c19505b807798ef957b9afe80fa214b4bca53e1947caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500b87d39f5eb51303e433c21651d77d1
SHA1f2c340d34b3c64dab388bdeacb4c3e2e64a994ec
SHA256b5cda426bb82dc38b15ec06f7577993f72607e7ab6cc25adb2801c748d8394db
SHA512380a148961325394b2e1e0d2da80f053874fc3a75641e3cdb73ec09828860f1b4b8629f695eff639e6c62ced8e02a5e2d13ca792306bceb3ffb11ffd134b0beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7de0247e8d3bedeb1eb53a3964d3a6d
SHA151951ddd2aacc21aaed535521f0ccdd17cda654d
SHA256cd5830f52b8f0357cae1ed116a04c0b3a690e31b6b19f568f602d3e28bec0db2
SHA5124a837b631cc2bf0a5feb545df42573b17a804b93a6d0ce74aa6ac7913d0cbe67b1ce66a2fc9cb744983701408722837d2015d7e9728107ab675bbc2a19cd3deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d47ea95f8e303e478f7f17c41f373a49
SHA193c83eec0a8b65be0897cd6e887c02c7bec16095
SHA256a072a7c3685c7433008505d2b3ce3b7ec11afc72995d82a95a6b90d4fae97e6c
SHA512cf71fd6b8bb8de5a00a82c21dd9ea0776b11bd6b6452fa1b081ac0f71bdf9edd6ee4bb89668dbdee4f885f2c256eb2aedf6b8ee79d2f0ca66ee2b08805949721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c8c421b9dd9485a10bb95d165a1f28d
SHA115d07f9cef388fb557819f87e22f9c13cf18e9ee
SHA25622131c243c3a74fa2966cce927995f733d51bff6eeb2d19cc745a28d1300d48e
SHA512b40b05fc02ee3539c183a63fb1bf75b75199f62a6055d065befd3acb7f8ad1bc37a18e52e6632aac2a20d3956eab46af09e1491246c70c352340906397a27ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a8dd338ed5e0de3e02d8db00b702dc6
SHA17b216eaa363beb54a2dc60ec7f4fcfee9cfb0200
SHA2563982db6d473de9a22ca05482f54704cd4e806ac29548959a14abbc4eda79cceb
SHA512d033b1112977faa97298583c6ca58b42af5c074430715c7f969c277d81c61b0e2091115edc2301d6eede38547c035b0bb159343eb7b203037944d877461bf2a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feb9fb48bf4f45a8461c62b18383b502
SHA1f6bf7c4206fc69b6ff332052cab2e63efdccd42d
SHA2566552a5bc4c322c9817065f27f48b9f41d8032c3eeaad2c83ee1325cb7c0015eb
SHA512325218b3683e89ed241f12650d2e3ac02e7054bb4ec578a293d483ca4cd5fd83314b759b32d39467a70225f3f6a58a51139d9bfa428599580074865f45e39654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7ac42d8021f74a762d90f14bd953b84
SHA12f598eaab90e6f1d33cb04035d824a02f76abe18
SHA2562c12eaf862d6805ce215c78cf34a6fad38ae24f75f4bd1235668e1d67b9852b5
SHA51286fb80a38d182fb317bff1b025553da76b8d7e407314bd6c382c352c86bb6b86e3cffa8b9fa46020ff8591c7798777efbdf26475d4fd67e5f5f8f9a36d861c02
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06