Analysis
-
max time kernel
155s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
1d2661c9b63aebb552429e150a32185f.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d2661c9b63aebb552429e150a32185f.html
Resource
win10v2004-20231215-en
General
-
Target
1d2661c9b63aebb552429e150a32185f.html
-
Size
25KB
-
MD5
1d2661c9b63aebb552429e150a32185f
-
SHA1
282b20fbcfce5ed3f631bf9859ba3b41647f1ac2
-
SHA256
8ad7dae6e2a273a0bce9ed997a7a620c08bcee4eaf12ceeb416f63911a514545
-
SHA512
1a37ee31a107401582648facf95bea5fe5d7b4210d2ca108bc32cfd2c3bebd96fb2e8f4e17f9de4a14a7995e96bcfd8da435bd118642a3d37c735e1a834e8852
-
SSDEEP
384:UnA4ywxBpCGhoztvukeKXXTujwKYTA0uncLIWQQ/U4cR1LeeIYECdG55LkuxOk7X:s17wtWkeksBu2nc1k90t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000005c45a24f073e6495869cb184d22cadba6e65430bb0625be5f1ac4ff2e2ca991d000000000e800000000200002000000018ce7642ea924987548f7b6a8735ff43c90f8dafe97af7af5125c074a941f53d20000000b95ef30645347e71dcced12c895ebf26e7e634e1bc65a076ced3305e078c0d3440000000bed526e49ee04c6ece5ded2424ece02024ea4095626949dbdab02dc4803fd00077c375273e07eac3cf52ed4787b7e0d4bcfccb6c5ec30bc7fba23379d5911ecf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000584fa680215d346ccc0207aab309783156b37d6ae0e01c602a73b309875cf135000000000e8000000002000020000000cd66bbbf8198b009ef691babeca3fd4f91a46c2d88e003fb74648b24ba11e8fd90000000a135d529963055dc1b2bfcf4dbbba2b1090b40fefe5df02838e548f67154b8e3249af6083b4ce2a92de21e5b624a86583eecbeba202771a3b54ae954bdea81ceb5db9527b81558a3301afabecd7f5ab2e43adde29c6f69376a08cfbef5068077cfca4ec3861a244f5d60aee5f94d20ae4655ad99d1e1db63024298e5fa196086de092545b157fc48deb26c7f3d5a5b9a400000004152d4ba07606ef6a035f8ae0db34d32a2bc81d6f0c87adc6c917eebd16bfa9efd8f44f65f3ba0b83fdfee16555aab3122fb7633e7ca9422630b01c6ce9a38e7 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5040760aae37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409724199" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34561171-A3A1-11EE-B16C-EE5B2FF970AA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2740 2652 iexplore.exe 30 PID 2652 wrote to memory of 2740 2652 iexplore.exe 30 PID 2652 wrote to memory of 2740 2652 iexplore.exe 30 PID 2652 wrote to memory of 2740 2652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1d2661c9b63aebb552429e150a32185f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9b59eece119cd35c255e6a3dea23126
SHA1ebd576b252eefafa8e8dfb336ebe561bcf737d9b
SHA256bb81951fa9ab4d53e397b2e14a27328b3d2839fc076f64f6cffe62881efc3905
SHA51219b81065f39e03c6070d1a1de46d5a7000873fbc00e0d636926025d45c4e337a4ba76bae81bc84846302389fb91a00bf07a355616b708f0dc8f5bc49c851a6dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52135aead232bb2768619aa67bbad2b10
SHA15f30539780c0fede4395418bfafe57aff4cd4c85
SHA25614a3fd031355b634e3d5492ae6e97872adce17ebecae0109e1bbe17135046618
SHA51244bbd7c194c5a5eac8524d256f8a41f3c024ac62ca5591039cd891c47106115ca6bc251e00e8148640b12d6d8bfccab780bac52121174417aad89f8155344cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8357479fcf0cac63a17988e5538931b
SHA1d63ce9278ef7030ee56e1b32ffe11de89a5f65ed
SHA256d81bfda6ef818330426477cd956d1ae47817611027a583431a759340a1f5851a
SHA51221484778aec9765e97cfe82f0862e9fe0c742d6847cfa1a24ee670959949acbf924c044336feb12e9c28b8d0598fd8a65223fdffe45d600e3b4927d82bb028c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3620e552936809f952d85f480823adc
SHA1a3b2372c5953ecd8a9905aaa314196723f35c91b
SHA256b2ea315811067e19d3595937b96ee1f2533930cdbdf765aea8187bd7459d33a4
SHA512ea16875ad85006c64691a034673887b8253494128c7bcb0523329f6c858ecb4f09d821408c9cedffb55b00472ea3bf8469bd28df6f3c795c3b24fe0e5034da7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b93f4f8e20f8839b2f0fb21c2b999f03
SHA1b1833072667498cf6d59bfd2a5921752cd727752
SHA256a5345fe9b29770c038c5051af39dd9089d4340dcc3da56a9b1d3d5f4262af2b5
SHA51258a2dc8cd03dbac1b981d0e770f5b3eb4b4f284bfd892d0ab7ff143a43564203032698fb0646ae3242d0543b66f61b562b7f85602efe2b2789b7b6c11f910c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591192bf0b042137c4162471258fc08c6
SHA10c36bf4bc1404edb46fe43f9b7247f87298943e3
SHA2561525b78fcd7a11d12e9c45f82a657f434031c6a64c17cbe4dcc56c6ebce76750
SHA512538c649614b5d34583e04cf26e4d072bd5a34d4aa772bbb4b6b3ba93f6f9f3352c55e6c757bb8cc5d21ccdab06747ebe5497b70c3a0e36480a9ab207c5e86908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b93e5c3a1c2d44d8fe2ac562bbcf9361
SHA17d999d9f43ed1c4c7a3f44784c0e86b41cd53860
SHA256fee967181a8125fe7fd2c4f4407e36f188789ea0bd957fe0924e563ce11bfd3f
SHA5122072ffdaee1d54da0d1b0ef93e295aa23eb14150de4c8f309a9f50f9bdaef5510a01d8d0d2bf735c4234889188242c910ce4e7db1ca5466320968ec9a25659de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55692cc6e989796656640083b4644a2d0
SHA1da1bc32d303f5b0d960ad1824a38d63c646ae296
SHA256ad6a742fbd315d5002c52447adc3a00084d49450afffdf7ea2759a95afde5d96
SHA512d5a6e5a6b3b52904b13b83ca273c88d2b8a412e1c2eca35eb561a750c8e9f94d0eb6f38867155e63ee83d4f8c85d2ede26025c10e1b380cce355fa22d6a30b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501ec82b815e2f61c0349ed193fe5fd38
SHA1d4e219872708fbc837882557e3a8894b7f1c502e
SHA256bd65e0db04b269192986fd641447a54b2b5f270c5db88ea94fd1d603fe922210
SHA51201af6c1c5a54971c914287503f53cdf5384eeadaa12d32e688c5dd6dd12398f6a4651448ec1da042eaa87e7cd71a30f8ce83c452acd238e48a78a3e8d1e64179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558428219a9e8c8e8fc3c15585de06b2d
SHA10b0492cdfc559989163706f43a20284277332938
SHA256fd0730a2da8cfd37fcdfc5d1e01fed119a353854ad319d001982d98fffc7e96f
SHA512836f9aaa663441526db94aa4247ac10cb35dbf0a2c9f6de05a6cae0e02292e63e180f041b9fa7eaf5466926ba6b4c58a24584d3fe4af8ab2e382f3ac96d50a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53252514b0dc45bf1b6a712867edc2ed1
SHA11e7260ac30a8c6ece00185b4fa37119c727bbd73
SHA2562ba0b55ef48f6501dfcf6c0384895ca7b6c718e3a8eb72301ec113fb7d655e05
SHA512361d31a7e91984354dec2bbf593c4eb0f8e259530f593fafcaeca3d6e85795cb3a52632890487890db36e8d1cf76ee65c4001c987a1f81df79f4a21bc69ecd2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5390c0eb96a0d892a03d599fb16be00be
SHA18a92cff550cb690a4da0f8c1d83141c3f38bd0c0
SHA2563ac5e2fc923628f7f823d7948474cf6d530fe14fae5d810b9971751670db8ad4
SHA51245cc92aaf5abcea054c50122bae4c9f16e5ac5092a5b627b7a66ba8602b2cd42fd4604894d301448ada821ee0cc4e0b8baafb8f3213e1dcccba2fc41ddeb99c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563d1087e7dbbcf269cbf13f7a555eedb
SHA1582971fe3db765a942ed58a6075200a3c715cd35
SHA2565b3a652677a2525c71431c6ca68610b664290f33f007ab7a16282ceb8d92ed25
SHA512ab08435eb1dad41e81879b20cf8e698d204f9bc5251e216a8841427d3b379d99e934a060d18502346ec0f7da708f5134018cd16b0e467a07926cbfee2fe2b4ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5c5b288cecf329e722c407b96a249de
SHA173e44ba5902fa3e3477ddd2c5b36c45e0fe8a48a
SHA256e3a0721e50ffa64e673350cb31e31bcde50fee67107f6a08bd0378fb9f5e1eec
SHA5120f02cef615f6b19e988323dcf5af6c8eadcf2ac4f02e71c446bfa4c07e526bd7b5515ab511ac57482840410eec21ac3d74621ccf31ed116993090c02ae47a9bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4b59550c07600bd19e14d5f08cc0401
SHA1c4e0d3f45db129a6d1b81a3e305a073e2f9b908a
SHA25660860b5f70f941ab6d92c567fd7a188a44b99065acac3bd895ce1d5e36facb89
SHA51210e44641208700e910a079ece75ef0d864c60071808c4d02e2bf00898c4cde6430af793c201e57c7a17e02618263843cf8a2001088e8f6c639bae1d075f15e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5816e908faa2f7a19cba6e958ea792896
SHA161dc21baf9803d83a79ebb70ea1725ad5056cef4
SHA25684905983e31959445d38dcb3b9b59d40995dd5138edc17776bfad68ca3563dab
SHA51226e1287c5837b9dafdb7e342e0ac17e0861a2569f65c2b715b3879a1440e7c44ca826bf18f53c1ca12a1fee3051459c73188ac0e210df6d7cca896811c440f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faa0aa4120b7fc9e478664b52094006f
SHA1860de46cf8b3b95e4a5a7ebf5940989c04afd267
SHA2567ec6d9235e24713d79569e4a430bae29d71b1935d5fd45c203e7f3f8f0ef8842
SHA512bb90f90b6bc279cac17d9fe3316fcb1e9a7f61cdb0e31b4c67e82e799ed6e3679a37b07ce68c72f325ea41fea026d53b9199dacd21b9b23bf2485df7e1188b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52922c0390f395cc34031de143f82c80a
SHA1d000445ae44c6577086f54a946a0ada4297ff3b1
SHA256a7fffc44124b66c07929aded74bd568a4eda67d46ba97d11e3ebae5b44e7d95b
SHA512cf91a2301cc53edaf3e91042aa9116e78847d1c5820370ecff1ccd8c0f46915d74ac20359ce6b784d13ba2c9d347c44bbaa0130ce8ee87cdf009c4f589a00cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cad3c29a021576ccbd5124fb1a38352
SHA19304e1795352169a888472f4e7a18a9006dfed9c
SHA25624b928a578fe70c56824066276e6bb6a312cee23d0ae853ca97433642a100af2
SHA512c626ee573208db374e059b1d7b47f2bc55ee3295b68b6a709809a1ddd691047f4b6913eac64e0903a81e1b124f2ec44f949fd312dc361be08ca95f3fc0f7b09f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06