Analysis
-
max time kernel
137s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
21ad0a6e1919fc0e6481196b5079bacc.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21ad0a6e1919fc0e6481196b5079bacc.html
Resource
win10v2004-20231215-en
General
-
Target
21ad0a6e1919fc0e6481196b5079bacc.html
-
Size
6KB
-
MD5
21ad0a6e1919fc0e6481196b5079bacc
-
SHA1
02a3460af50b888123175be96d4f7f97c236a8f6
-
SHA256
e7c8bbe5c71c9ba386143987d2e0eff496a5fa671334c6fad7555db4aee401dc
-
SHA512
6926804174e6ef7977709cec788a90183efc15c72bae43241eb43ebe45c5a878bf52c8807b04adc6304602fbb9c12a3373b01c92af0c16fffe1fa04d4ae915f0
-
SSDEEP
96:uzVs+ux7FZtLLY1k9o84d12ef7CSTUsr/6/NcEZ7ru7f:csz7FZtAYS/54Nb76f
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000a6642189fb6ba631118ed2b0d819202ddff0cf2ce7fa915eb21c285e3abdbed4000000000e800000000200002000000052086e3a618360e1b3534a2c15480e76885b29fc50319855a8b1fa122a9e83c020000000e7ada7d86b88c1b1375f59394f209e8135e1f320c05d2231615d3172728c59f4400000008ac3af2e5661dee147124e04376fa8a5c6d2ae8ea4d0858f01e52afcec09d140dc1f68670fc1df68c9484dfea4395868f236b2c00a4bd7427dada5e69a6c03cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{396F94B1-A3B5-11EE-A675-6E556AB52A45} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409732794" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e97e28c237da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3048 2100 iexplore.exe 28 PID 2100 wrote to memory of 3048 2100 iexplore.exe 28 PID 2100 wrote to memory of 3048 2100 iexplore.exe 28 PID 2100 wrote to memory of 3048 2100 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21ad0a6e1919fc0e6481196b5079bacc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ef786044611315fee3832192ba7b244
SHA1da1131b2ce93cb9a2bec7a541f31c3add1a1ada2
SHA256adff48df26797c86a0d69cdb7cbeabe83cb49562c2aa915772f01464fa90f366
SHA512077f82a455becfdfc5a0a6f7643ba114f7c92d70717a319ccdb269c613bbfca67aa8a03429a9778b406e1fdc5ac5d4bc4f59f31559936044cc70e7c3c632e4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b54784eb0d0702b217b564e2c81818f
SHA14745ab18a217e16d6d7bdf9269a87170d4756057
SHA25692309481094df3f989401a221cf10fab15d95f26ce7e83846d745062fa49dbc9
SHA512e872656d125049f6aafa21d27dbb7899cb5a659eb90d29f36d2c7ef25476f712769ec03a18f329a940de332b0e62f75b1ff46f9fce20f672ee63467290279712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abaa60fdc1d4e2d74cd6b7858dccc778
SHA1d203d52763455b0393a6aabd025a5109a7bc28a5
SHA256ae9a38f8365102acafe6504b0664fa152475ada680bfe14b2090a9786e07b84f
SHA51222323e687cee9517b11e8e944dab36917ae95967d88909f9825a36b6372bbbf87081c0efae718e26855d8a37c8a5519c0e643ea9e7aeadb28ae1d207dd5b8ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fbca29da0245d49fab19ac50a0104e2
SHA15e09d99dfce5a2a25f2532f6df81b1fd2608a496
SHA25696a9c3c8cb70447e414cb5ec65b7f2201fa6980a48fa79c648397f023db0b177
SHA5127101a155acb65f3a0da28f8879e499cb2ab9121ed3eff39e9442c2818a0a0ce99de589843a1546b00fea4b4aa447224a937e7c00326dfd3bfb957c5b644ad4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535e465170405f9558700c94dd1f35e58
SHA1692f5794279cb3b64f032867b31372de6def2193
SHA2565d6039d73ede831d87550fa0c480cfd202ea0cf91f55d932227bde2c9d666a1b
SHA512453d2ac5b7688c1337332f1b0b4272237aad7e0546b471ca9238741b458d40ea8b7a9478a19a02f2b81b8cd49b8eb88a16813a0a95d41ce6a06452f14457e68d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e17118aa661e8045525dc0f13d8cc603
SHA128fc3ff1dddb7d6068b5ee26cf5b50623e99e7bc
SHA25667089923a56636118912bdc199132c859994c56c892172dc3616fca4edbea2d3
SHA5125a419ef4bb3e71f3abef61a6a62bf49858bf61306959d986be427e64af2031eb6085da594a7bd709caaa4ee71bc7c4aa8de89ff4005c8da37b07834c7c6caa42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a798b4bd5a4dd5c430117b3e2e222bf
SHA147db8d5d51289d8839ef12a3141df25b8c08a231
SHA256bdde44d269463bc748d67a6c49472ecb824facda4cad3e2bea6be88f3056df28
SHA51216643a2dab589050b5a8e8c4f3fca15af55fe7b2cec7d28394e9c5523ead4d4eeae483b71f1127cc3d564386fd00dc7769bf69ba721e639f02d0db952f75f53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccff20c588a2521210e9a75032783b80
SHA11d089bff3539850439cda07984271cbeffacce88
SHA256276cd796d4782ada47a38902048c53b47b020369aa3675a5661a9ca06ff1048a
SHA512c097e7e5892a587d7839c7aff4ca641210d74c9e2ef799e6d3a7fc0b69812f3d35d54d138523f30f79e62053a814e47722dd33a26c10bce6bcc1ab566d2214c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54faa89fc134106271b7bd36eafc6ec01
SHA15b48143aedf4b9d5e71e9667915f29e9497a9b2c
SHA256a02921da26fe94476fb4ac53fcd78310a9f455045e53d652c2ae7f0474ef96be
SHA512938d785fbe2ba50c19583679996aeb05057b123d29f54f91d46168c694a44626190499199899b8b102e407d35b6adbdc96a047b2c44563d809a3c17f6b52b3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cce17195c25d7dca20bf9d59e501ea9
SHA1bb4cf61ff6869d669d65c327a7c3f4a07a808604
SHA25630103feb42fe489050e0f6449bd3fc0d607ae27c10301a512820978f58a4e665
SHA512feeb13a8ccb5418bfd124581806122facf142a4077baab8da9119863cb39365ddc2dc5084d253e5f4bca0c2db62de95072650637877e7a6eca1df43fd6e2a197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5785aafeacaa013cf71f16bba55517e8c
SHA164aee313cce162b350367c79e747b777435d8852
SHA256db20f50a065dc04b2b87d33adae6c00b2a76832256479699510010c1c98bc81b
SHA512b6ae9e4b2892e6159fb708a222ad92ce9502196fad25bf795032b5b8682910d227c4444b5b488f570b446d93a87132a5f2ec71f026de8bc0b2ef78e8e4116241
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06