Analysis
-
max time kernel
144s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
1d5ab7ef138c8d48e1c0748783dd3d62.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d5ab7ef138c8d48e1c0748783dd3d62.html
Resource
win10v2004-20231222-en
General
-
Target
1d5ab7ef138c8d48e1c0748783dd3d62.html
-
Size
3.2MB
-
MD5
1d5ab7ef138c8d48e1c0748783dd3d62
-
SHA1
4ca67997db4584c364ae7878cfdc930f55bb2df4
-
SHA256
46471f7e44b0680f06e4d52b7c97b1b3c806a6172df9d4a30b6df440c1ea0cee
-
SHA512
d95337a5352368934faab30d75974a1193ce8b5e9b74676e6168cd1231a69be5e359e7756698efc63988257a6e6a145541a59823eb87148cdbd48da544ad1169
-
SSDEEP
12288:jLZhBE6ffVfitmg11tmg1P16bf7axluxOT6NAc:jvQjte4tT62c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000deeae9a07813ee773123687beb4dd58d834945c362ddd2465c9dbdb9e6a62f43000000000e8000000002000020000000057b4e26d6d0584903949cfdd9867da3d97146571f7ba890510cfebf4a95b8fd90000000d214eab3cd9d3421b4993e62a2fa9246be962999eb4572218b924e828f5bdbfbee93e4a4aa81fc59ed0585d7c778fe9c368ad81f6fd15af54450fa5f018442c8c0fc905f6e2719e2ecb37d5b80bfca7a980874d5d0056cd736f7504711f3ad0a7e596843be2489ed0b4071728274ea720e84bb42636de02f9ccc2ac0bda4e587d97d281f5ba894499e24d5162dfd01d4400000008446862119ef6be4906305e7240d8c266dff55bd8432f77eff9046d32d41178568ff3e646d3cb72b70e7d022849cc6932d2e05bf4b7f62af122ad53a43e65635 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000001c7503aa0407e34508354067d47a2b5825827754dd7ba04b64b2f9b6b8b2d3c7000000000e80000000020000200000008e38b2861c9bb9d8e7496c41d24753e3172706123c940ce41e3f734efdc09a712000000074ab43d2f59ffac8fb13dca9e736592a70e5d5f7095abdc8ed648e25d12c313c40000000d22f122f82da66b60c598467b9acb1e8a11095759f91a774a93cff7c76281b50274d1f37eed55c52d8174568ab98642e7eedc2fd8a3653bd36453eed687e9b4e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a055b8e9ae37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D03B401-A3A2-11EE-B49B-CE253106968E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409724567" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1708 3068 iexplore.exe 17 PID 3068 wrote to memory of 1708 3068 iexplore.exe 17 PID 3068 wrote to memory of 1708 3068 iexplore.exe 17 PID 3068 wrote to memory of 1708 3068 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1d5ab7ef138c8d48e1c0748783dd3d62.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dff140f295964e6c7dcb5534b91c1ab3
SHA1251a69a905eec547e139be837041a38900a73ae1
SHA25605d8e0d1bff85bc1300b540a9599e5fb589428cd6d233b3b759c23e894a20b34
SHA512292a923904522cc0386d39d91694bd207de676ba057268f90a0568d6d6f8ec30be95da01932be5170ff96337d64153e582ba39c6a85561eaaf2694eaed0a5384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e82d4f7a028775d2337cfcfd2a275667
SHA149915033184c1b5a0cff503ee1e452d545d919ed
SHA2565d21fc4598c772753d4b6932f1f71ed3f1ffebf55b51dbb2507edefa94cfd7ad
SHA512497284c864b6ff48926d8b4ec712f4392526fed43f3d2a8d532e6305601e9c5a55a4cf7cc25a99aab9c1c75c046d3309c4d94edc581044cfd41d987579b7d361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55df24118bf2a38c1e5aed049629be4da
SHA13dcc2878c24da76b52ce8e5c94026502f0c0adf0
SHA2564c73a1f2f7bd1ef3756cb3022738746f590de9c3dc2c248fd54685222dad2bad
SHA5122e49dc5961ac9de33e50cd52b168d43ddb920d087c9e9816dfd296740fdefaf597f390b3891b1d56f3b7a60620bf32259e39edc8d79df15c39e1b525207bf69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6b180c6944ae2cfe520d7548779ec1a
SHA1e7d6dba1b8c14bcc0fb95a6a769ccf3060e884ce
SHA256079f9694be48176f8b88a9463025ec9e640a8d9e9343991ab7970e7daf4d152e
SHA5128a72a9c04d23b435262ba6ef828ad7c4e076a64fa35a24f5bcf00f70d271c515e0b68fb068f9bb7e0a34c5d5a80e60de7c4a89aa7c3ae394f91bd64ea03868bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5131384f20d3028345c4bbdd2a2523ace
SHA19918d612c04423be0332700611c85461f5ae8ecc
SHA2563f3ad47be6c36c543da4c17a8dfa4a312be352220507ce8ba439adcc895b4844
SHA512ee40a0226d6101bdf54b6d0aa67a566c7535afef9cbca82812139fade151892de27dfd05aa41d0ebd52f6b6a880be10d1b9f475be06cc8c2d635656543b43169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5487696b1ce8b87b7beb247d22932542f
SHA16ae324ce5a996960be158337a801ed9347a91cb2
SHA2566e77a571022d07a7cc8c9176bb7705706f6189f755c0a0c6260989cc6da7c262
SHA512cfd5ddc7b8f2058d15377dfb1f11170c8bdc478925e286c11e5e745fdb888facb194c38788f5ee4be0fcbce7e17cdfba7d018374ce1fa1f0ac0b1d5f8ecc18cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c44bd076b3c80f9714d9f52f87b57302
SHA1fcc2f5f5f9eae89f54b5abec52e3816c2ab7665a
SHA25698a56e309756125f81372ccc0b914e37c9177e5093dd71a2780bab8d27e99d0c
SHA5126e0f91d88e4d63b78abf9c54a1ee28e883f886562ec9f60c4fc6b591091d414ba11d81b2a9dab588afd8d575a338192f09325d94bc97453e91ed4282bf502cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e02f70d959964b748fc60e7998b2a48
SHA104cd68a20fdeb2180617d18b4540625864ed3306
SHA256506d6ba67f9de214b96a69bd263d588426a7ff9d600133842548e0b3f114e9fb
SHA5122b6ae22e91dc4b652f8e4c60edd814f4b3663f021d48ff07d601e0448bb00ecab958eb6e9e051b385867f074f14529cb6c3cb3e1078173aa18cff34bc4a7bba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cf64a81d670c4b9a5254997272e1695
SHA19f8c9a5516b4aee992c10d54bb161a386940ca85
SHA2562416b329165c5e24e60eecac3f7f76e387208fd9a5f55ec657a19868a35791f5
SHA512f84cb18caf9258133131f7a0a6a5bee31ab7dba866a13aac7be744e45989b9439c807f92053ae3a33ef80b2ce09d3fbb2a87919cd6f12a3881020206cbde0aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587db4662ec2c4ec8cf8db7931ebac8a1
SHA11679ca700ff231a5f2ffd3288160534866241ecf
SHA2569c4dd794bec79d6a092e975c9dd83d336de64fd9f57f3b83d0ba51e4c7f1f35f
SHA51225747691b1c1b47dbabfd7fe6268101e32474a5b0f4e01ca8852e2d93c9c6b233d0f0409e0a7a04644125433781cd27d718d72d8670aa6e6aa8cbcfdaded6806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5208c64ffd9850bc2e3904172ba46846f
SHA10931cf2ccd73da7a1d769173bfdb24822d0e58f9
SHA256f8bdd9925316528635f58e581603d68d0e9c46343dea625d97d9bba9e58bc6f7
SHA512033a6320208f488cb1b7f5dac9ea2a85895e9e0d469e67793f85b694f713832d04f6394809247066f7661d821448a1bb92f841dc3d420401bb5548cdcb39dcd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc7cfd6a9243c842391d3e24b25f70fd
SHA145dba3051b5b58b700f8eaac4442d706393a8fdf
SHA256ef54a958ac319338145c2df784888494a377615a552a015922a7327b92145962
SHA512d2e32c9887c33048f76608a50be702751ea603e95ca5c8c5edda60d11d478c0f361ddb9bf8de0c4d7a77e36aa7988f14af4f50b20ab07b6b06083612a03df687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506e681e7b6f542e9a9689bfd3fb51455
SHA16e39341db94a4cb22d925fa492c7c0e161be1e32
SHA256629a65ba2d09559dd4b153f27819fc51135afb9a7d10760ebc4c42b178b8bfb1
SHA512550c87eb274746620b7f62bbb48d0215298bccd7fe2fb714e5d33370c8910182df566bb3f602fe53ee594c12d7c84b601b4d39618a96192780c3f6e44a3c892e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d56d7675cfe8e1f8764100a3b667ca6
SHA1363de7fb42b56b1372fc5e29d211a8f364b4b1ac
SHA256afadebe949fa17a587c47bd926ba0f167ed3bb0c2d7a85bc5e1255e16dea9224
SHA5128e3c5ddf9fb882d55520d0467a059bbd818b3847a0414fcf8d2f575d8f69059169892cca7ce954e7bbdcad133ece6e7851563e00e99dfcc40d3f09521082203f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cc2eecb9f9b3236cf2305b366acbfed
SHA1e7f76d6961273833abd4abed3730d659380ecfa1
SHA256ca77a051a85184323429428f79d2d1a10bf241e3c61cbe0a8a100e1fd2827383
SHA5122e7cae5c254e4641342cc77eca15a2bc93d1751c8bae8f8791873272a243a55f1f596434af23ee7e1debb49321401d23a3773b66f4c626a1686f338be5cb8fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574b8f26244776329644c4ef4a9744237
SHA1a2e10173aca9c41f8e20be18ad6197021ddbe1d0
SHA256c0a3c0567004bb912c6e103d657a5ba1122c9c4c484feb62d0f3075f719c9891
SHA512389c3dcd483002e99cf9515bd6a143a8a6ba1b988bc54743d7caf82d259723c95e6cb2c4476701bb0f834aef59064cff4b6f1cef1cc9a051d6e0918b8682b396
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HVBRC7A9\jquery-3.1.1.min[1].js
Filesize84KB
MD5e071abda8fe61194711cfc2ab99fe104
SHA1f647a6d37dc4ca055ced3cf64bbc1f490070acba
SHA25685556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
SHA51253a2b560b20551672fbb0e6e72632d4fd1c7e2dd2ecf7337ebaaab179cb8be7c87e9d803ce7765706bc7fcbcf993c34587cd1237de5a279aea19911d69067b65
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JIH1AB02\jquery.min[1].js
Filesize83KB
MD52f6b11a7e914718e0290410e85366fe9
SHA169bb69e25ca7d5ef0935317584e6153f3fd9a88c
SHA25605b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
SHA5120d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06