Analysis
-
max time kernel
118s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
29b97ec54e7ff01035f42c8cc6653f85.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29b97ec54e7ff01035f42c8cc6653f85.html
Resource
win10v2004-20231215-en
General
-
Target
29b97ec54e7ff01035f42c8cc6653f85.html
-
Size
73KB
-
MD5
29b97ec54e7ff01035f42c8cc6653f85
-
SHA1
f4d50dcba97d5c3c2f4196ed0e04007667b10d51
-
SHA256
16f63ad25ae0bca19548c01662a3aa9855d2697bb43a43857d5e6698d360973a
-
SHA512
8e9a66eb72c3f4306723fca7e4c6703c0fb74cf8f8cd34302a971804fbc08901041a25a2c4ae8c5941a297b7314fee68cc6db151cd5a7bafd8b2f1e44cbb2d03
-
SSDEEP
768:AWpOrFWN2asoljFIYgIofylwHp6/eC62PX+qSK9XsJdw86CelsMpeyFGylEvdJZM:AXqjFIjICdbCPX7XYuvCe6ljvdKL
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409747398" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36FBDD21-A3D7-11EE-8A38-D6882E0F4692} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000009490492597b8efc3c76bd3b76545c75f897db2cc0118bf60f60af3d38492792f000000000e8000000002000020000000a36a20b4fa41e6e95d73207c18ab26772d7d2468f59e7bb59a2c9430f45b6ecb200000001b889d0b089c3b182d1b0c075035d7ad23735ace73007a6b5f8ad2333d31067240000000970b8296c6d26f381a0899b0f1eae4a0b7756e540a87adbe2364431a788a7da3a282976e37ff114668005274656f0b8a12b26e37f577a75b5c6479105e0b87cd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20baee11e437da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1052 2232 iexplore.exe 28 PID 2232 wrote to memory of 1052 2232 iexplore.exe 28 PID 2232 wrote to memory of 1052 2232 iexplore.exe 28 PID 2232 wrote to memory of 1052 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29b97ec54e7ff01035f42c8cc6653f85.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5d80c0012d6d869bbc5b2729096de40c6
SHA19a6a4230c164ee03db5e1279563ebb0acd3ac5eb
SHA256f42d148b01ce2fc59a6b8ef8effce31987d9893790eadbad75ff9a7bc2c1e9b5
SHA512d880c47277330c9afbbc1b9b6d717653732b8527dfa7b3e61d1d9d8baaf1bd5522e98ec32c6c8ad8d2c7faf1b3c731b2c82b6fd8704de9f0538575f0f56cc61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cafb3d5643700704bbdfb02be8ffa9b
SHA1930bd44327d2e57fe4388141c69e747f3f1daa2b
SHA2564ecd9bb03832762fa1753789f92df8e4c1656445cf6179d777f7faeba5ca8c2a
SHA51280ae0882011c5a7af49d9eabd63502ee29cc5f5df0fb139bdb018f957a42f70484f2988e662c6c102b76209f298a33cbe68a6629c9787d17da8df090faf61eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f18057707d8344b8327e14d4c833a076
SHA108b7491ed8b9cb95ce73c5ad45f27ab8d4aaa3e7
SHA2566ff687beccf8ca17a40ed0241b3a5e152a0e9b708950fe2a5faed56b79c985b5
SHA5122fd4a56d128e6d2dae98e4b173bea7942f968f7ce8307adb2d5250b8d09ce218bc7bc5c0f9a13eba23befa6b44d69bbd91ceeeac549fc3765a36948eea6a81f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572f9de519ec1b3ed1c07fcdff17f7ed0
SHA18724713f7ea21fc0bce14dd34532a233f84554e6
SHA256971527f3a9dedf59511876a9d52c5db8f16180f394591fc534ad76e26bdc41c3
SHA512208a06907e855925a75e2ddb3a2c63abb787453a567dd334c4f56ed19af9f99c5a2c0b8bc422df2ece67213921eb13689aa84de10e188fb18a2b9dfe2dae90fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2852e926da5dd4b62775698561b4e8b
SHA18463c1f13436709e5d4d9254c65c60e486078d2a
SHA256fc64d1f7816f3dbe3ced9f1118ca12480389fe144cce63f6d914b1827f214f8d
SHA512fc721b6fc952b6b5563755e9c277969f72d3d4c7a032b1035eeb78c9150950095491d5464cff0329364314f53905c7244845b590703a3bc6d24f3b62823dc1d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549760aa46f8b45940209a4b51d793e6f
SHA16936ff8d85748f9e565bb0dac2642fb6ef0b2aaa
SHA2561b29f68996df7eaebbacb973f923ab5f770ae6b27f5d56e452b70ca3f4205a79
SHA5127792d6e0341540ce6638fbfaa063ade340352f6897376cddf37079af227e01ad397b8522e5a7f366a5506c09ccb329967cae6845228bed7574372061a3214b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b1e04e34c5b2427e3fa85da764f107c
SHA1a3ef890ebf64da56f0994b4787580aca4a1dc574
SHA256ddeaef7bb49cdb0a4efa5ecb193cf69466e532ecab0a567ba5fc1169ebff53e8
SHA512d60f681424850c10be593c13d848e0f4c37d166a77c05f9dd58f4b5771aa51527d949ec03b657e1eb5443ad2fac5df596ef4d299b4c799dbccb4ddf3326b250c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c7dc6f2dab67823506ace7c108655c0
SHA157ac38cb902dd08c769e2561356704e04291ac69
SHA256ab3eecbe9bf6463acc61e640b0c6f379034dcdb30215eab72f73f06dbc10aa78
SHA512fd86c2df99cb681aa803f57fcdcafc00dfafdc8df5db396891b022ebcce17f4413272c43b9c91c0e0d38a27666ec9f78aeb4713b8c30e5ffcbd259d826efddb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\cb=gapi[2].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06