Analysis
-
max time kernel
251s -
max time network
289s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
1632004b014d3c7943ea52f15af5365b.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1632004b014d3c7943ea52f15af5365b.html
Resource
win10v2004-20231215-en
General
-
Target
1632004b014d3c7943ea52f15af5365b.html
-
Size
16KB
-
MD5
1632004b014d3c7943ea52f15af5365b
-
SHA1
67d4dc02f2ef9e45821a7a7fa6041e131a0fd958
-
SHA256
e09eded7572e507d02b6744c374cb2a02a9d51534d6cb2f21adb11636bb7b44a
-
SHA512
7bfd502d0794c7f0ca2e47e87dc797555f27cd52ff0357499d9e84dfb05f7348b1f6ca2159e55ada69b8b32c766edf6694ef5fc09ed4c34d8a167ec77295fcd3
-
SSDEEP
384:W12M4C8/huZNnYnOgnJznEgndenJYnzCnnTvnwnrHnaVv2fQdTYVlXAqC:I74C8/hWzefvHAqC
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c19300000000002000000000010660000000100002000000020ec0e5b0775a3c2284474ca4087c1c7d7aadc8f44467b2b06813409d738d9af000000000e8000000002000020000000fa6bcd5ba4a33878f15489efa7fe352eb7f2ea868e07fce692896db06d292ba820000000215fb5bc82a077a8b17753bb4368d61c19908588dcf7c5bf878f23237cb2a83740000000ccabf18df23431c03dd48854578d5486bc40e32081241e21639f992725f654209a0c3894d80fd22a9af00b6018e803517e57ae519bb7c7d22c51085dbedafd12 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0965fd21439da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c193000000000020000000000106600000001000020000000423e3ff3da3f3915176754f546a5efcfac9cff0e938d486a691e0f1a2b5cc6b4000000000e8000000002000020000000fa77b70af7c74d14cc56de899c0f12a6251fae9e956c6fe91bf92699649f57629000000031c9cba4632741fa96b684d0b1038705fd2c6c227765fb5107c02c7217fc602bf89482f7376b678ef6dd87c5f3bd8432caebdc81987b08c111cb78a15220f72e0e163a3184a035ef7da6c67596c8f434b326146523a9bd7e98ed60c4ea0abddc86dbf586a67ee0f980b9e557c4724a58f2ab8935dd14fa3139be1cc1345ec838d7169a616eff94fcd44a2cc3cdf345414000000065b776a6aa4afc15285ee3f0c42226fa1520a2cc0e6ab9d2772e7d957e77b39df6056b808174c64de851839c44898d900dcb584b30569961de7bf48fe9ffcfd1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F784B680-A507-11EE-A03E-DED0D00124D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409878283" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2016 3032 iexplore.exe 28 PID 3032 wrote to memory of 2016 3032 iexplore.exe 28 PID 3032 wrote to memory of 2016 3032 iexplore.exe 28 PID 3032 wrote to memory of 2016 3032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1632004b014d3c7943ea52f15af5365b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a83bba6241a66e9d856c7cc43b8987aa
SHA103c17adc5dc014774833319a8d345fcc039bc610
SHA2560e6d3632fc0e3e6cfd0fe5846e8df318030f1c25426049d1608e95b4c8cebe60
SHA512f823868f31e69179070c4cd69544bc9573ad9e6d1e1d8b5645c52a51b36d7d38e799c1855525f8958c578a2f8cc637dff1be0c20b7ab55f078a51c4f83b4144b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50938101ed81f409660c4a433e699ba13
SHA19a93ce79e9db152d3425d7087c2d8795fe1ad315
SHA256ce8458112a4f7a52b3f57b1e63e7e06f40f47ed4cca26d671718bb2c597563e1
SHA512319376746027102a6e45be21254dbef8cb7a057a20a78e238379b8cad3d32f8497710baae9e7315c6c631080b8a11fb81aa8503a293303b083afee56707f24a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b63e5eb3785a699b69212729822e39e
SHA15d67035822ca62da4f93f708a58500a8195d9736
SHA25601c5a9118129ee8382627ec189ee6f7ede7ac3e2307cb3bb4ea627bff9009243
SHA512ead59fb8835c31d528b0147fa466896ea4727e0a3aa22d801052dfcd9dd60091bf6daa7ae69afe697e472a7756b1f41a301b2334a3a0a624809fdc97ff9705e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531a69f0540572683664ca6172569be7e
SHA1f9311533b0761bca287a10e7618ad551f54acf93
SHA2563fc915ffe6d282b279d747c431e616796511dd767a3261207eb76a541a9a841b
SHA5123df7928a4c7d971eb55dd3a102dd7285ae1fb6f321ab99efbdf23d131eaebd4f2261a762cc40876f7817ecdfc95d6e786cc456eb543e193e2870868668e23dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dc88c8366b75849a36f060742f011ee
SHA11009fcbefeafeab4cc425546ebc384fe0dc93f2c
SHA256e941aa046d9a01e52ee5b4bbf14f2f9b80314d5e0e0afafb44c5451d5d7b82ef
SHA5128778f09bb8e15e9271ed6b79d7915a4c7ad8eca5b08e51f37fd4b68280d57cfc1dde954924316bd59b151ed1cd8d002ea77214f0376d5fcf23c4a2fb07e5c5c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a43aa8101a14f244c6bf8acf78ae014a
SHA15b696796fed755c9c3482750f34ea11b83855897
SHA2569d553ac1e376bf224f1b69c2857eeb93acf6f0f08149e18728f1020ee592a60d
SHA512aa40e1fc24a6cbca6f0effbc3381fb2b7efb6c7f45b5aebf7e124eb4ae6a677bdf2f90af6688fbe64fe295cde2095589d6d102a115e91a3c91828626a9c4be67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510026fca461995263640ad677636d8d1
SHA11b7f80173b4745fc83578b839edaf7f19b3bc891
SHA25671104ed315935b83a0df58c08ff18c420ad3f05c81938ff057cb95c3635ef573
SHA512199e11de7c59741ca6ba1eadcf0dbd1b61bcefadadb8f80d834ad9656731abf7d75c307f3dddbf8b16cf7cfa411f4c1e9aa3b3b3cdf6265df203ea7e1a56d928
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06