Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
2425889ca18e6b654e6806c50d700bf9.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2425889ca18e6b654e6806c50d700bf9.html
Resource
win10v2004-20231215-en
General
-
Target
2425889ca18e6b654e6806c50d700bf9.html
-
Size
6KB
-
MD5
2425889ca18e6b654e6806c50d700bf9
-
SHA1
908231a70a481a38495b755fc78e7f986caf8ddf
-
SHA256
e62da49415aa90366a5396e994068689ffb8663fac515bc615112a86df1cd062
-
SHA512
4c9edbdf0fc7d0786f16904cafea2c084e3159e6c7fa4c26557aaba1d60dfb8fdfe2502b47e6ee8a7bc504fd38d9688d8a7b92494b35b255dbae3fe22972cea0
-
SSDEEP
96:uzVs+ux76jLLY1k9o84d12ef7CSTUsZcEZ7ru7f:csz76jAYS/Pb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409931639" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000069d29bc56b84e187f0436c01ac9541eff242d2576e92494a19d6efb22c0fc59c000000000e8000000002000020000000a57a01b09922516ddf60ef071fc0c05d31d632344a212a6349f6c9af655994df200000005275e3c9a22bf006bb468f45481d19bba84467507220f2564fa181c79a045b7a400000006294b6d357f4194aefd3a7d641982080d586f3061b04ca21f966c06d7a9304b5ba81aa846b7d3172ac88136850d106eef59e95e4d9bcc03fe84336ec352e8c56 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a58c079139da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{324CDBE1-A584-11EE-9AB8-F6F8CE09FCD4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2440 2348 iexplore.exe 28 PID 2348 wrote to memory of 2440 2348 iexplore.exe 28 PID 2348 wrote to memory of 2440 2348 iexplore.exe 28 PID 2348 wrote to memory of 2440 2348 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2425889ca18e6b654e6806c50d700bf9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5835caf0edf043405f57c33645163e20a
SHA170f7c1b6aeba3d1a92d1587269e53b0cbb952710
SHA25638120f518ea68cc2b402645a3de8fc470057c5113988f198bfde0c4a4eac907e
SHA51203833b601cde6ed216652226735dab6fd08a5645ca3028575a02f7dd59a6ec7db2204774c5445426a192618211aa49477309d9421d2a5cb06aa8bb134edb9277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5490aca39766e3d42959472b1e2ee0268
SHA1f459d9eace207c03f5ada748928916d6ec795210
SHA25699f4dd763635a4da5c36e689e1dadda483ab3a66d48d9254f9beec29cbe5a79a
SHA512f00d0082ce4be7d0ae98698861f9885088feacfc7d72ceb4678cf4481cf09a1fd448a1842189b54aedbfd810915df8a4309b8d6537fe8d71e190759d9ed6ace6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f835a6d09a032cd0a6726221bb63e7d5
SHA166be7f1d7551133a9336fd1197827a5d6fb3bd6e
SHA2566c8ec6113a234a354e96a4458bd795ab75eec72437a1006c19d2c1aab738a0d5
SHA512007ae0cedb49e69ac1bf81f3f96cf9851ef83c77eeb5fda963ea9ded983b289eb5ba3ee0d67f4b4fc08386444060dfae4e815cca2bf5074ebd24e79609d39cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d705b464ef48640c2216a73e8dd19bc
SHA12119d197df5d06d52c6aaac04973dc62e3b6c581
SHA256357da687532740879020f01360c58b8775b70c6e9407b36627a411aff8486cce
SHA512e76b6b9d5d352047a0ad41d43cd6b74cff8d4ca464756c2c3b54fff4b25f20de0a203e398ec89455c07e81dd497b843769f091502544eb2b088ccf92a5304993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca77b27240491e7789ee7ed0f6e4e865
SHA10875d92a8df40c6232273fa2f1317ac2da104e16
SHA256361736fb76d3dfb030f8061d7d40bb23169c1f494f1a05ebc9259723c8ef1026
SHA512da269f3f356f12ee323c265e140f4e2c5187bda9ef537768a4e9b15a62b6bced09027d8a023c76894d49a97f50adf91e8a5b4dbdf36fd238cf771aa9a615c55b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506ac996edd75fd084b32c73f42888da7
SHA185210a39ecb5a0551877b356db21828e89705c37
SHA256b5b680df4da1967de4f855a6663f6a5d87da9db1a8c75dc9ccd30051d0e2ce5f
SHA5128616f360745dc4a381e2efa0018881a0733eda41db627a38129477273231c73e5d0219e051a8f6ef0e802b2833545c91dfe384db1c38ed4e4dd5b18f9e727311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515a7128d2a9c9ee7a7c6bf309d2df6d4
SHA15fa661293ce1a3cc4566c03af5b67f628386e1ed
SHA2561f7c23ee6cfd9995e51a8e64455b044e531dc93dff56885d26d728a2d01deb1d
SHA51263dfc6e76066e5bc22d415e8a0200fa09c3d7a32adb38a13f551bd344ace68b4f4376e8cb59ac17b872c199d3aa4f57c4618b3bac204b182e9f83433606a0fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f62165b262d4eca61a50339cb129f5cd
SHA12703e76ea44983ce86952fa9bc7a30b1a8d72e84
SHA25674077f8237657386348f0fe13efaf0fd7e37145c8abfe4a37cbaf79e250e9c5b
SHA51225925ee3264abe4fd04a43f0bfc62e3b87e3c47bcecfd7398b4c06797bea45c005a99be7b3b719573b0048efd77e34ed4895ee12505862cd846c015054172df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c5c3376cf7aef020b799531a9fb8235
SHA17bd0d8b212795c13e662fc83c946e40a4e4ae6b9
SHA256adcaf8f5abcb3925d12ae57cac8e46b80929198af78a8f19f92587dc305eba69
SHA5120763cc34dd3db31b0e732a5852d4eb84e66994c099a4a3974f72512357bdc4b618132603ccc771edf1801c70b1a03e01a407680b366382038659cef866e91cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58292f70806c79212b31824acf5eaebec
SHA1d1aa0476f5fb4d92ad3bd8a0eecb30a0965717a6
SHA256c5becf949ea66880156b0cd4515e126e62c1a7b4f9a764149036f9f2ab678b5d
SHA5121352f975b0981b746d3b42a4a677f412fc2f946f088f5e0eef1edf4bc3d9e8b2b486e794b63814015774460a925516c6d027b1270f40c78e0e69fba3e8b38d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff821d0803da98694520d45dc70640aa
SHA147bdee087c7b58229719df65e51489fea1374fda
SHA256ecc790b6c0c4b23a4473de0513aee9050913126ec4cfcd927465b73f618b5e7f
SHA512fd7b688aed6abf98d62da5e942c76423c55066a638b364f844dd9e0214a308de3796565dd75f6759785e2bcb1aa3046fe0a2bd73082a33703f42e4a1a280c174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576ae58407b2fc6561ca77793a29e1351
SHA11a977dc8c0f704b8be41effa64d0feff8573b708
SHA256a414ab51ae8c9bb73d97b1a400412a626563bf315651ce7bbec2ab705a0df344
SHA51276b4ac9c79131a2d4fdc9bc1dbb3ffcabce9488d22ca2ae8bed0e218dc63db3f71b901855351f3556a3c56f4599f0ed50573f555340aa506ed2ec09c2ef2cb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576202b03703047ff275993f247872f96
SHA1e72b42dfc619ee9a6d78f36b0dc3cf20dac683d2
SHA2563222f6c2fbef2d39b6c496d6ce5b4b2b492313f7d77ee8c25e2d102f938f65b1
SHA51288c9270c732fb8fce3b82fbcdd3277edd9773942d778ab6fe3ce6d80d04d0488fc409bbab291cec1feed987a25bc092e1a86533bcffeb9f0f9eb603e455f76d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c256d643103bdd71ab89aa3e4639ffe
SHA123a6be6e07e5dc212c8717f22825e88519fbd456
SHA25603107d77cf735c7a5ac7c4e99cf4114467f9a2245e97a7a454bff3c945575c08
SHA5129c1a8bd8b3ce603720433f7b0eaf7ae681f420a11b35a847b211318cd0ea405791ac65cd0b3bf78a3a823e5003c6a76c91f4e04ef6f30261f3c9aba28e24f1aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5791c0fc844eadfc5c5c0893184f1940a
SHA1cdb8a842d71d174c8162457137638d25b09dfad6
SHA25643a6be71bb613c2c68623f252c2f6a14bfe57f92ac4ee4ece38a93c0928e8ec3
SHA512c196b885fec0a89a3e065df4164724adb200053cafbbb25e976e3584d347f7ede1f3be94135ffd195ac48651182d312ebaf9223ca32466fca7ed7ff9bd76053f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52ada884c8aaf2f82661c4417f80f54d5
SHA1506c979eb3ac100b40bcbec8ee943ee57c889715
SHA2568551d8497756870176284cf39c2786d06e8e4f689d4a6db1cae1700176578068
SHA512d7c43454e40e65fe5c10eeebb2151e9677dadc65b00822b6de3bcb7c58d962edc6b698ec9b18415bb928e290f763d0df14cb7e68ec53bed6a33e69218b58800f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06