Analysis
-
max time kernel
122s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
19cbe825b9609aba69e918aff328fca3.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19cbe825b9609aba69e918aff328fca3.html
Resource
win10v2004-20231215-en
General
-
Target
19cbe825b9609aba69e918aff328fca3.html
-
Size
53KB
-
MD5
19cbe825b9609aba69e918aff328fca3
-
SHA1
b8952e6cadfa4d4a719f63f48a36c151709ddbbe
-
SHA256
e24d4c89592a61c400ab6059ea1d3ac937da1fc405316a02a66c4bcde35198a4
-
SHA512
285996f56937ac013f12cee722b0fdb519b332a0c23d015d4cf72e05d27502348f2a33dcc7844c30733b25287b0660a8b45d553af12287f67226eaca4273599a
-
SSDEEP
1536:CkgUiIakTqGivi+PyUArunlY863Nj+q5Vy0R0w2AzTICbbxoN/t9M/dNwIUTDmDu:CkgUiIakTqGivi+PyUArunlY863Nj+qE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000483ad40cc58fb0dc92c3842e353b0e3211ecab593eb6e59f651424842a56db04000000000e80000000020000200000006d7c50bd74f12dd29b1df6c3608ae12fedeb9e5cb30eeb7dc88420b20724abd92000000020446c59081658d752d1218400829e96a2912c5d50cc14f15dbf00b56de7409c400000001efc2aadca70dda39e82467dfe4b1f8d104348ea314febb01c791d028ea64e628a668bbd711487b2bd21214bca2ce99b240c87d88dccdbd61ae924d069194068 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 008661b09f37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409718002" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C58E8AF1-A392-11EE-91F8-4AE60EE50717} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2408 2468 iexplore.exe 28 PID 2468 wrote to memory of 2408 2468 iexplore.exe 28 PID 2468 wrote to memory of 2408 2468 iexplore.exe 28 PID 2468 wrote to memory of 2408 2468 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\19cbe825b9609aba69e918aff328fca3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b9b150ca536fbb3ae169cc55813f0f4
SHA165582623379681d962796b73d891d196edd8bec6
SHA256366d51ee28d2f3c56c75f4c1dee08a7a0d1dc0ef837b6a818b80396441581c96
SHA512eb3cfaa2b70fbc1dff7b0863c9e834336ff9ae4fd5a561488cfa4f7246d94b10b84b1f40ea5d058db8a198d663a12aef8d1ba76dea2e74e8de11a31caf7bf845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5467e191a75f77f38cdb1f741f2e1e377
SHA17b61631321ac77396574c659b32dadfb4e234fac
SHA256b501288a696514d68cd65e48956346d215d23482b3380deef927547326134acd
SHA5129bb6cfa8dcca0478da1a4349ccc4d9ad3f486ac30ffd3139194216525c087a4e2b43c09b6a8f3731abcc33f55ff49f360e1af3573d77d733ee83094280b5bd83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e92a2da38798f99c0594104dadaf3cc2
SHA1dbc8a84c24aa5ac6e3cde7003596e72d906f9b64
SHA2568831206935bf642f229b1023421bbfa61161eb1ce105f9dad140adf3f5a69414
SHA512deca66c95a319a4e0d82ffcec0b2c8f84e059102d212b77b6bed3d2c8e424f4e4bbe49122f9e7b967dcb8308b1635ed23708ce70f111987280c09854209ed697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593caa9a51f28f901e3d3e00b1d81de55
SHA110a0cea3426b2a20f72ca738f035b206156610d4
SHA2561afe29bfd902a2b049a9c0800772aa9efb7a4f1a9b90110ad4954d654d51d3ce
SHA5122cc2cc49708fdd8b07d4b82cf1d5457b84a5d4ccc215cd0d581bcf075ac4a87b0ce36ab78546344a6c0268d268fc3d5d91eb4b150f74ed48a6511d4b9fc06d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ad6a5ce629c9c2a2860623051aa2d99
SHA16213e8710aadb7c6f697987697cc7c9f40e71e03
SHA256ee40751084395b92c9585227d351be640d4048d689a473629f5fce3f6b986f70
SHA512e369bd0c659a74b5dc8ff16a161e119bee16ddf68c882c37adf4bc9816459ee591911e50d80c95f63d13c9a8696aaaabc29e92c62e6f99d351f1ba1fdac163de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e26f6078fb67cccb2f20cbf03244c004
SHA1e7c04ee3fe2bcb012bcc35e466a751816741bb01
SHA2563d0e7065ae6634021201828e049f4bb440bcced30a21f8c63adb554b2bd4a1df
SHA512d2d4bb97ebd6e4f12551c1fc718bd02449df25159299cb3759922738b39887bda4f3bd942dc6593786d42f914bce80291324522d66d62902c6de5b7dbd64c786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6838eb705c2149714672c60279ab9c2
SHA1359cf306eb8aa7144251a2ad9d6b6ef1c7a1a53c
SHA256851a1724e3d9c501430d8c311bc00333e014c126c99e9bdcd585a4b8d01e7605
SHA512535b23823ce22e357abe39da34d07aba1038a3bd50ba8243655e54c09090ccfcfcaa65e2085194f92adb3e0bb9105d749b6167b7d2dedb31d4f151a3d813f0e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5086c9b80fa2741f9f4ffb76e7cf96402
SHA15268c1cc6ba1ae747f1708ca789d05b0d64469f3
SHA25674cec66c83e80dde56ebeaa80c1ef6c2c35c401d12fecffd32013a1ad4154534
SHA512eb3685bab0eadea8be4f912518284a921d73293ea0418c033af32095e8085a03f999a8e58019c7495363d12fb62e1ad73952f61f2f81999786e02f232ed9d0db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59733b6d3c6afcc17a24c89b50c4d522a
SHA15feb139ab7cd0fa03e3718658b4ef85ed04a48de
SHA2567201d2692ee66249cd519981b4e93589f7caa1179ea9ccac995d239cf010ad9e
SHA5120ee98ffaf4c859f9009043d33c009871b0f14fa010a981feabb790bb3d49d21069fd916c82bdb772e7481dd7951020877db5ec4c11616b8128bf85b316ee3ad5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U1J1BPYJ\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06