Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
2824fe9f37563f389394fd514e0ae146.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2824fe9f37563f389394fd514e0ae146.html
Resource
win10v2004-20231215-en
General
-
Target
2824fe9f37563f389394fd514e0ae146.html
-
Size
14KB
-
MD5
2824fe9f37563f389394fd514e0ae146
-
SHA1
eeb392e2b4a92dbf952f4bc7fc1128f945ae8fd4
-
SHA256
13be8831deccf9a02c7bdac7386310a4a17f61d736b60feee03823b5cd878002
-
SHA512
70a1079aa47a27b9267bd729ec63b43e0812146d1db33e1caacf56b385b384f16b2f97392d55dd560368fde3e3bccb5adf64980cf8774123d8f3051a1b43301b
-
SSDEEP
384:Y5N1RxemqtEyLu3ltKtmd5b7g2d5bigUVQ0c:YDle+UubImd5b7Bd5big6c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000484182a7b9b301fc5aeeac0992ec62965747a9edd6c4f7580f38ab980f528512000000000e80000000020000200000009530adbb331f2d83f6b3c633169874ea588d0461070a81d48ac4b9ba067c00d620000000e9f0655cc179261a23cf12c65d1073a29efe38e1f51de1d05d515f2233c1af504000000070bebf0930ee22eb93193af6f422c269ea766436e92040c8ad1cdb025c9d78350f2b1b808e79bdf21c3293aa618ebd5955d9a0107c2451403b04540c5526e093 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409744604" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF9AF061-A3D0-11EE-B683-EE5B2FF970AA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e4b79fdd37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e91786640000000002000000000010660000000100002000000041f0a1ad83faa9363a491183b3318eee3ea9a8d153ad1b13a295d5f17fab214a000000000e800000000200002000000080fb385dcfe9e3bd8e3876d72a6d20116746356bfd03418d6f4f2d60d03b065590000000e6c90ef5b92df0020016283f7cacbc4179a4ebbd493b88bd8c6e28b0cc27a370b3bfe5d49d56b70e05c850b7dcaab545436224514b33bcccfc86e08742b0694d11893d9c1f8b7e3bd17f56c4aa5da5d4b6b505b84eea1a3449d4d1844b04e26e68d4f8456927272a8e787b1fb76126c97ccf5fd7a62540cc5913b3b9010f90159125d1e60e0edb3d7b88023a1cd9104d4000000028342ee60c9580dee1cd443ba0a137e7df52351914f16f011f20a23bf90b501d881d5e91df81f77cf7f46ea56879c894836165c0023c9108c5cc9ce23344133b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2348 2072 iexplore.exe 17 PID 2072 wrote to memory of 2348 2072 iexplore.exe 17 PID 2072 wrote to memory of 2348 2072 iexplore.exe 17 PID 2072 wrote to memory of 2348 2072 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2824fe9f37563f389394fd514e0ae146.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53999fd1aabd9b4d7892c4398577e908e
SHA13fa92043fc4a44b26ed907b793f39e4ffd8bb108
SHA25676b3d825217d83e3ce244e745aade670cd8e6334254b20b06ee3c1b3db594c81
SHA5125847a68bb4316a4a140c6a32da91656f9819737ed38ed002cac09998f70a78704d870954d3d71805ed192a639d73ed4b2d3a1f3035ca1a7289bbde3a1b532647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d10e5a6f9268f61b1bdbc61370fef668
SHA168dd3af723c291aa5666bd8792128e268c824f78
SHA2565ad68f27e69c6ee4bb2c03da9424c764f95f25a7d7e5e33a7078b8bbc79c4ef8
SHA512e9f071c8b6d7aae3a3f8efdd9a4c4ffc7396620e7c138fe05862a26ac3528b47e49afa786335904286568cb2a9b074c5b6ad3229150af3f4456240dd6b5aca2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a47ee2e51b90907efed5303bdeee8f76
SHA1e1115343e179d82f19e84dbcf53c81f21de5d682
SHA25614daed7567a9cd977ed5084db975371cba875c3f39bd24f9336dfb6879de70a2
SHA512e5d5c17724ee23b606599598eb401e5d9f895f158d6cb5abbc65c5a86f79dfc1bf53a03274a90bbbd47dbc5763e45e0f4f7dacc37ab7e579b60b5578f385cb34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594a288c0566c98890bed0e67086c2b35
SHA10e0d5dda6aea5757784296001d3875b3a18d7d66
SHA256902b2cefba16abef14c3afa386e5eb20f4d9345559e34d944b907ae4446987df
SHA51227885c3ecc188881f9604292c05f65017c4d8b3662a89d1fdf14398583d3491d78c02afafa25702cc642b8bbd8ba753e0a83cb57b364bd402a82dcafcbfe9d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55926e7e8465018c44b845375ab3a00c7
SHA120d8eb1a263824ae9087ba50c2220f0bed14e0ec
SHA256c8f3a07f998a0c3baf5b34e18bda60a6025098a602655441dc18962d382550bc
SHA512a1f619960a1ab9396d5024e51b9e972612cd2f6d401ab3453d2c9b8aa9fcf2b9e23a90a5e100edb1540a3b002211ee543131264caa6ba078d17fc3b00929a000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8617a055c2f040c98f8e29a170fc771
SHA1f0c4f26502ca18dc5b5b61589c6acbec68793b13
SHA256b640379faa4f4d6448771bdcbad72192ac830ac5a301ec56344348cb2dc5a6a7
SHA512f8be896b24ec896bb027478dbb49158e18e4de891c6aebafaa25176f13ee3dde3c1bb14e5abbab28e68b1850be49d38d1a2a0b440bf621ec0747b371e90ba191
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06