Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 15:29
Static task
static1
Behavioral task
behavioral1
Sample
296e7f30a71dc029bbb0452f311f22e0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
296e7f30a71dc029bbb0452f311f22e0.html
Resource
win10v2004-20231215-en
General
-
Target
296e7f30a71dc029bbb0452f311f22e0.html
-
Size
64KB
-
MD5
296e7f30a71dc029bbb0452f311f22e0
-
SHA1
6786b90df351de60527fde001b2dd50e9fdf8581
-
SHA256
fe7fc3818701dac76afb4701b5d9a96ad122a6191f1e302383d0b35f376747ef
-
SHA512
4205d626d24f53ab0865a7042610feb3f439784778da1481610b3f141dc774ee6a88551424721dbfb9453b6b73b8540f3591aa2e77311788fff8ea77ec2282a6
-
SSDEEP
768:7D85hrDmuc5ahBukBGdsmWpDJx0ZyB5l+CESLEpzV1GAK4qPD3mrm7maP6ZtLdEM:7DmmtaW5qPD3u8k3gZIwyp3+o
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409951391" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0cf0a1fbf39da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3037F781-A5B2-11EE-A508-CEEF1DCBEAFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000fa0c56bb376ad648381fc461d65fd5fefad79bef939484a18cce5be49e29206e000000000e80000000020000200000006317c2e3b57af61cf3ff0911cfa59e9236b11d56407c49b2362390697d2677d820000000bd2e91715a6ecc3daf5195df043a4bd8c074f12a7ee91ca5ba7dcb66bcfae37e400000007a75c72cc89ca12b4fd21068f70350f5acb3424dac40e28cf2330de995b706d7c6e56a068c35b860cdc401652a2ee2f1b7a2580523b7e376dc86c8250b1d10f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1692 iexplore.exe 1692 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2772 1692 iexplore.exe 28 PID 1692 wrote to memory of 2772 1692 iexplore.exe 28 PID 1692 wrote to memory of 2772 1692 iexplore.exe 28 PID 1692 wrote to memory of 2772 1692 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\296e7f30a71dc029bbb0452f311f22e0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587f2754ec8747606371742d3cea14dff
SHA1a2969935347550d24534ab72c9a5eb8f4665efa5
SHA2568a9f60c9287e27c9e848703ca2602bcd5312d05e0a6fe16cc56f07bbaeef65d2
SHA51275b369cf03921baaf72d5934d022713c9df22a8889faa2b5cd3d49f52deb3021e776393f7d2162aebd2d9335016dd9458a51bb0b75d8ffd4c3a098709a3e4d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db02463262d4922bd775aca7972c6427
SHA12dbca56a6ba6394dd323376ea50d6fcd10d628c6
SHA256a66d85ac1dbcd9751450439158a920014f41ba5b6b38bc40a036c72a140fb05b
SHA512307c8eeea4500aac9ed5bd836e71a516474bf852c4a3cba39216c6e197e4569e68296c219be40866d95c929ed5ac101202df898a65651eedadf2c22ab899bdb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0b49c82f21fedab2feaf86002e977d6
SHA109d382685439756dda3f9f7ffe54c7369111527a
SHA256d86ea8dec0ecfe0b1b10a6d0a7a3bacc98a6046023badcff3ed0e15ff6e679f8
SHA512db01ea7532085a453948f3643c8a32f8c7f50364ee2730d420069380b35d1ba00e546d0fca570af0c517dabc1f2a2fb0e9b5f510875a5b43a6d11abb2e56a2de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f067c20540fb7789187e7fc1eea339a
SHA1200ed47bd1f044168ff448b470591701b492e51b
SHA25621078cc7ff09ef9ff19ec1aa8429a7c6d74b08f5e3e1496647bf70dfbe838748
SHA5127699063d0d8d5531df48ace2baa258832c3fc11e4bf815058b4c62d57a633def57a65eba75b8945081e9ebdd12055fb5ba425b622883c18a400465f86e186ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f47326ef24f85d989e1399214bb272e
SHA13990f6d6f29d333dc0a736b79f5b9bd622963551
SHA2561294cf3cb3861cce0b30855a49e2d1e2c2ab643faf8f8c59b3654660a806892e
SHA512c34489febc457347e971cb87dcfcb05cfc4b7f0e0bfdcea6e1b8e5837b4263b8337631b49cdefa9eac168eee81d77f8df6d402ca637300a8b1067e0f1fd5da6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569cb81e4e9e61322f724fcfe9f319447
SHA13de5e3f828f833b241624e275d5ed9ca4a915940
SHA256a2bcf1ed82bd5cca0dae1cba065303ad534a2ae7c92d7460e1eeeeb4de0465c4
SHA512d38fb5ed398c5aef1506d5767c97280ba6ff2af7185b43d1e664f49cbeff828c6734d6bdf47cb59d3ca49bbba7612d7ad4138eb588c940751538d64f3c1d103e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5186507df26785939c0293d2dc6597cbb
SHA189a89b67c2115af00a0e00ab78fb3354f68f7ccb
SHA25660d094a91521e8e9728f65e224d23b9f0adc00e447afb5f9b8f19e8abbb5a498
SHA512c5d173633d9598e72c1a9f1d8caa6e84c278a1aa23d84ad0b469a377f4323740675c8c2da13d925b4973152d7ef8eb1c02e869180e4485dbf1548ea97e3881ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5206ccb03133a8f8ade67be7233ba3b5f
SHA1b5b7933b7c4d9ad7e2e532dc6c92ef1a6beeabba
SHA25651cd9d306aa0750cc3b5156ba77342e1a256d818fbb72813246321ab2112cf9b
SHA5128358137bc66fab647919f8fd68cfbfcff78fb0be3e4e4d900fd8421bd4364d3ba4e5f8cef931d9372c3cf46e0b792a6a5db35fc16a71dba01373b3d469e9df30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7bc4ba9697c16f63d9c90945ab2e536
SHA19a3ef5a7003f8a26ffece9c6465d3049e57e4578
SHA25649da68024dec75e8da012c06e64195fd6365e202f405deea0130e670265d7bad
SHA512a416170934beb6fb919eacfe00f59f37b14b5d46fb6c4c4255eb8bcac6f26998ee4153d2f9d7a5447de7330e616d73aeb3d612692a14d3cabe41daf7fa5bf862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57482fb4055269584d38b4994890590a1
SHA10b06c110b9c9438600d2061011092f88fdab6ddf
SHA2566c6307bf24dbb9480ead6f9aaa60d8544fe858ae64dbde1b3ac5c396c71d898f
SHA512b268c4feefc6e3bc17f359b8c3423255c78cedcfcad2d31f01000d46428dc2490dc98eb7f2256238431fa9d29da9f02f5413f2b9106e4a9c2811928643689cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e9b83892f58206670caf63063c668ff
SHA196aa5094ccf457fb2015989802f3636bd47bb440
SHA2568f168ec13bca11d6954b199b0e7f44d2012e5d5f39feeda2c259ef86e9119e43
SHA512fea3c316f9419f19f4726a722ec02c2fbb291e5cfeb385de52a057b816bc8dbdbf545f8c7e9dbac525c102d737d4bfe44596636fc1f463c561c26294b9176706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e93bf80a0e626b1eb708981f7e5368fb
SHA1d05cde9e2fb4a2ce40f3f878b44bf7c1f8ffa1e4
SHA25616f1cf30bda931823f0193cf8b9dada1bc888fb79dab9c0ad686a1d49f4468e7
SHA512fd5184e5eb593256c783e94a57417a2bda34afbddd8924f7192bfe690969c2c0e73d1ce8cad50841265a65b548ea64c6a5d75df406f76e451888b07963677d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7f410725046c9db567450847e0ef4ec
SHA18ffe808d440df0bd8d8fb44b9c4902b8ed969ad5
SHA25661b8aea294f140375cceccb9f83eaac48441d4d70071dac37fc216962519cbf1
SHA512fbe143bef526da729b126eda4cdd898e1f1b7b179e692faa16ba162ba20758d12aa7822f3c9f35d49d3af1c7ce935e3c04bf1e67419f5a9bbffa47a97f0d9151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a34bdf873721d354eb74d86846eda53b
SHA18fc1e36b18bdadeafba6bfd7f7a101686785f825
SHA256cbaa0a95b7b080a45d40414b1c53c22c5131d1deaeb2fde41eced075e4d5632f
SHA512150625d98f1ad722691c4d29ddd4242378da4c6f9234559e10a6c252bc7e2dd5ba3675eaffd7976f111c76d5595b4b4f039467b222358f71eca90417d209e73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f6b901c08cb48b9c320a858c024d87a
SHA17b2f187b11f82033449df3d2e0fe6273c46afafd
SHA2563ca333b8e36c044ef9dbec03272a58591c52ce738f6b5e2a36ecdeec7ad8c3b3
SHA5121d7ff1f1566c1cc29c4cfd8c3b2a87be44446952e692e97f38f7339340fe91f52e924ac597a420188ba6787bc2a4a4f9cafddd7d68746749cf44e9b8815e7ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562dabcdca4539a47de8b9ff2d3c2997d
SHA1fdea629f4fde4cc516402827d373454caf5792bb
SHA256ccbd926284a95772d0c45f0dc4f3c948053b188b537b9d10a15d2bcd8efb88bd
SHA5128107ae8b427bc235d1dc24773fb1fab97ca6cce6cc202fb1ecf8c64d3de460adf7da78fda9171db20bfeec9ad8371d492f80322c7022892bc3615c34f3641ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5434d48477e0d4bf0b23d665e2d1a0d81
SHA12f816529f9d85121975d3a784dd3864b92c8f478
SHA256233efbae139ea51f7f93cef663c4813819099735ec67c8064e73681671cf9580
SHA512338b990ec13da87b98aca41f63cc3be5a560caf5b4e5ab33d26699c572798c9506816bd1ec3d4e9bb519f5dbe0200225d29e470a0fef1c0248bb6aa84cf4cdb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50353cb6568fd9f07158c99f52ee8c03e
SHA122ada62900ca66575867123987a95ee345f51107
SHA2563f9678c6c787a7d992ad6fa5eb75757aa9831e66d6364497e016bcc74fcfc055
SHA512c7aaa0ee102734ad844d309095d9014990b13beff368df6552905fa676cf4fc23a782c47920926888d81991c3c1ab6a0d75201838486a06b345f3cd96dd2d397
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YT4IJQ91\send-banner[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06