Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
1fe169178905dd75b2c13ce861aa2bac.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fe169178905dd75b2c13ce861aa2bac.html
Resource
win10v2004-20231222-en
General
-
Target
1fe169178905dd75b2c13ce861aa2bac.html
-
Size
46KB
-
MD5
1fe169178905dd75b2c13ce861aa2bac
-
SHA1
192a7f2fc4d472a9c003984da01e3040e3fcf063
-
SHA256
ca144378523171eca57de768f08bd3868d2156725fd4e29a34a7f0bcfafb6b17
-
SHA512
063212757c79f96a0d873edc7e8e087f0e5aae100eb1f6153f72062945dba34794645eab4c1294e38fbe8756a171b4bddb43ec18207ff8f00427010db07c83e8
-
SSDEEP
768:/pXOIa185p9+gGxHFMveZaMWhbvFmEgXOT2+y0x7W2S8T:/pXOA5p9+zHFlZaJFFPx75
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409914609" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8035c7636939da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8AF80B71-A55C-11EE-9201-42DF7B237CB2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000165dcd361897d4a00c3b7f8dc5b374583852e7d4e07a3f9ffe03fd67d87eacbc000000000e8000000002000020000000a68dc0bb3b58e83aeaeb70149880904077e9c261d632e8a6b3efd27426b41a7720000000857084a98604820d43f08d0508959116f8f9ebfb8dc626174ae67e33fcae821640000000bc216b13025d18a777a9986b51c750a8176d8b3648b07ed47f63bd620e524568e5e29f4c50f3f6c0203985504dc10b6843cce9cbfdf1fa0cf2c7b1ebbe993da8 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2444 2024 iexplore.exe 28 PID 2024 wrote to memory of 2444 2024 iexplore.exe 28 PID 2024 wrote to memory of 2444 2024 iexplore.exe 28 PID 2024 wrote to memory of 2444 2024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1fe169178905dd75b2c13ce861aa2bac.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD54de3bab63ca27e303ed412d5ea866414
SHA1c1fb87f2b750df6c85a4f68c2239886f3c43f647
SHA25684fa070a9c5b65bfda4debcd43ed2b7351878e804a34431d49a01d91d07b434d
SHA512b4245660c7e159415956e3ba620d1ee2cc26e4aaceccce7f4e212db94d3456928aa7d878b1584f832f4e69604dcd673b30ec7eeeba9767f5a8f44f4f960babc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD556406cfc69b56b15aa08bdf7c5dcb051
SHA13a64b36e30015f1605674b35860291ed7704f0ac
SHA256f5b68d88c6371470958fd729c0eee2fc3ae1753eb00abda61ec7d1bfd7677ee3
SHA5122f5c1a70f6fe94347927ec8e256762777df225d4dffae7555af79000f7be83a2303c1e6d57d6866201abceefa4fe9f866716517fa70a7452e705057f1f5117ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54215415197e86451319908c0abf58252
SHA1b7df38b0af9ae6094f48b255b547e3009277cd61
SHA2566d7a91915e9dfaa4fa255691050840de3ab5a0747e9a76ff7ba14812864514a7
SHA51269f4eda31d2a9a1738fb330cb8e1189ba5dd7344aa6582978f6c865aabe5bfe9cb30ca0537e3faaa473137b120769e0586996ab1cc1f30546aba29905df32c31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b73a1d20c004196b46aa3c53244538f
SHA1d1bba8ad07c3b716e88bfeccf4f526ea527d9ff2
SHA256c028f96cd7a5290faba61858a7d43ee6fc704cd12d30425511fe0a0e0facfebc
SHA5125fc93b4ea48e248b0a8b69928cb6128c1d94d28055e3529f1954b88513d3f9b11a1b9ae888da05a56ef31b60e8a542da942c40466897046e484e49713c9742c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdaaba42a8480dfe796734a743b8805f
SHA174ddf45be037e004ebf63811b04b47074de94c2d
SHA25695c752f0d3dcb1c66a2e15aef995785d874273556bb8eed7e8062ec80edba615
SHA5123b73b35dcc0787d7b455691f5c0c43a9cbaf1387129f48f2bd67e6c50a2717d7ec66ce20b860539b0b6394e2a03bc12dc492edfbb2d6fe5f63852c05a0427fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb785b38528a9d7c93103edb919a8129
SHA11c1364fdb7ddd21aea1a6a45cd686ea6133770b6
SHA256581b9d08c73407d906bfd8c08e5a30306b8a528973800c9c731988ae00b97144
SHA512a80d8e6f1d170a776f7865a99fb80b2f296666b647ccb770b6eb121bb902e08e843d2852f598cb835bac8de432c60875607e63aa7410db924ace2962def2d970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561258e48030a13106ce2e483ee80b380
SHA1467005a593982c46a311476a71032f48774d10d0
SHA2565c2a81f1ba21ac56c746a92bb00437123827c004f4b030c39e6f57230242e6be
SHA5123630b42dc788fdad9d3d6575f96290ac7283d59833b3908d4caf0937287affe3e84fc5ab7852797a4795b33ddf58ceae9250f216c4c8bee8cfe13c1c5f10d61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d036b702d43b09e7386a9f4a51861957
SHA1e5ed0d11cc3710e06da3ab0174a2cc30a1e425b8
SHA256b4478407ffd511c666a570faf512bdfc6a438a34b861ac62e3c20efcda02e98d
SHA512431c9c8f1c0b8f3028d75d7e3068cef57e35e53416eb771a733890e8b7b183103353910467cf14dcfd04747c37644e3ee5b048e79db918ba388202660347baef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a795771c140892399c039f6e76a3438f
SHA1c15c4691818f9700e6463ffce82c26364014b4a1
SHA256a1e3b78de1c592a27d6a272a5597a6fbf88b0a41975fcabe9857dd5ea4146abf
SHA5129bfc0eac142c47d5c1be5b0bb936e23fc414bc31c8572aa0430b2f14a60196df67fff466278b508e8cf43d01865bc856d20146bbfd702ff87150ff5b0c1feab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c36e53d645c3eed44812da630388683
SHA12ef9322bb09606218f7f247e9218ee8db76147ab
SHA2560dd40909ebec18691345c96e0ed9adb888341c73b66dac1478b3c09b643a5583
SHA51271d170972f57827a44a1dc72b6eab432f68004cc82ffc163ef6edc51efef12ebfcdc636f20beb464bc64adab0d3cea74f58a80cee76e08e2998db7db323ec254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ca34a76e5e820e34b91b7d05d5e9480
SHA19697934b9950e278eb60cf02a7796dabb2467f7d
SHA2567ae6cdbc99d71b88aff6e53041f502f14c7ef169f1c3fbfee4cb5187bf4d9a10
SHA512197905d80c0d1afdc3b1685a566a3b2423470702b3f52e798a64c37189d8dd0a6b72b43e4d87e296a961611dd84400a6b70b836f170de84218b3974060540aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ed2904644ecdecf2db00d7f4e72bfc4
SHA180028f3f7c120f9c1c4a2058d85b1616c6d3f9ce
SHA256924ba8b05ca01a914c830f199c54225aedd6d47961f483d4f9172a96819993a6
SHA51223666b8b2048c0bc567ff81f9225567359fdc9190e1193f8c1f6b0a43fc540b36dc89ac4705d5705c1850824691c35a4f646e6ff5353abe2ec5e4f791447a06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c482787c024f00b73599d4e262ed2f54
SHA17a750723b586e40ff2044c705db56d26fa05a273
SHA256ae6a5f411963b577db5577bc171db4963249690e16b0f6042b61f160a674a1c1
SHA51287fb0e322319b47a18181bf8ded27e6400b3b3d6d0ba3b0122598f0eeb91030d104d5b556eb93a3737710b2176a2248b25a3701cbbeea4254c52e02820e359c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a25d23f2ba80c7db3f2c2d932b3f318
SHA1b8cd941254344cc181baa110f55473b658813404
SHA256edffcdea37c8c9eba61508bd8b99bdeb8b8fa3bffaf9fccb0919887984e3a55a
SHA5127e640770559002e09d5a3817c68383df0fe074a2faacb2331824c67e90ea6717fa7c6a31f589efd4fcf8eed023feab1abde585f8b938b2209dd53c6ca36052c5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\cb=gapi[3].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06