Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 16:35
Static task
static1
Behavioral task
behavioral1
Sample
2d9ba237e689424caf5bf73213fdc7b7.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d9ba237e689424caf5bf73213fdc7b7.html
Resource
win10v2004-20231215-en
General
-
Target
2d9ba237e689424caf5bf73213fdc7b7.html
-
Size
13KB
-
MD5
2d9ba237e689424caf5bf73213fdc7b7
-
SHA1
3f0eb46a3fdfd367610264fc0aafd1060fd28b53
-
SHA256
dbbf88ce2a28c846ab2944cdd760a07eb9c8ac5eafbc66f1d62838262af49cbb
-
SHA512
39341ba9b1e828ed91b407328f1e6a1429663ba5098486693d717f880e1f2d5bb23c1aceb97c7bfc9d16d44b10e08a90ed2861eafa013dfc317d87bb83ca221e
-
SSDEEP
384:cvOAY8ci4Oo+zOoO4Q5naOo+zOoOmsKPxZOo+zOoOms2HS:cvOGgwy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9CB84091-A5D5-11EE-8427-464D43A133DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e64272e239da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409966611" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000023f6006461b0ee5c8e8464325b92ee6336509ee93750dc0492e51f112739085f000000000e800000000200002000000046b28936081013d0e36e09bcaa9c2aa95e5b3794013b9acde4dccb695e7d0b1a200000001a47414dca00e0cf9d18d646ebf09ad7d8eb56931b2590ef09e43d05d7ea447740000000af720c53f8ce6b92c6fe1b12738a73bd1ffefbe0a2977f1260c8421d7a73d49807aea3b97a799b184855709255a946d6568b781cd22312b489952a1e56e71693 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2332 2172 iexplore.exe 28 PID 2172 wrote to memory of 2332 2172 iexplore.exe 28 PID 2172 wrote to memory of 2332 2172 iexplore.exe 28 PID 2172 wrote to memory of 2332 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d9ba237e689424caf5bf73213fdc7b7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589a68c1ee3e5fb1337546ed259cd63fe
SHA1770b9f8ead69f63364afdb724c82cb0a58ef8761
SHA25606f3e01d4bdd7c50327a8f9594196fe8bcefc03ca4590f08c056c130ebb31203
SHA512b7ae66367837ab55cc085732e14b2f8fe21d10d2406aaaa32d960d5bfaf24e38854961da12cff0f50eb358e930cfa2e9ed73ef3ca6d9e1e0212b3d78813d9942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508a35b9bef63ee9a8932f5b05ad4dd3d
SHA1f9137ac69a8f77066dffa9a0c1b7937c0a6c715e
SHA256f7a5913ae2e659b316d1a8db1c24a85a21ab9d267c450c6b6d7cc14b7c9dbbec
SHA5128aeb47b66b34e157d06ce0af47278a3679f58ce566a6b41d3b1ab48b7b3e34432d567a4750a86b1dbdaf18fe136dd799a99c6b449aaf8f77f20101842f35e6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8e3b3a076a7b20765e7ed624c4caf3e
SHA19d5b6b38677a96fdf32b5eaac84eb4018697c331
SHA2561ec2d9a15e773ae75842b2bc78e8b07271effa5da96f045bd98d21330f78c6d5
SHA512d8a131b9f3d4c8ac779cdfd044604c40dcc619fbfeece25be981ca75b3adf1735f43796a02b300ae78d400cf12fcd341b7b1f370a781e39aceabc27a18aba421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e060eb025b2c8408382ec2046640db5b
SHA15ee0a64ab70eaf54c78eaf9dd80572957228747e
SHA25682be3e3ec2061fa1bcc3d43a279dd3d1db108c43a24cefeb9c1f6e2f72535589
SHA512b7b35aae972de334dcf8125d63f50aa7cc4712840c03c3f802ebb68093cb43a798bbb3a5b5c4430210dc7dacdebdc0352c53567cd9069e6dbdabe09322f612ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56232ea96feb6ad70c8223ba9ddd46825
SHA1cdf73d61b938bdeaeea8bae7ad6e9f264fd8d7eb
SHA25634693de08abd4d9b0a1e5bf81bf1b60d068d24295fa8c8f2584cae21162c2f61
SHA512b15f0113d75fd18a445a171c8e994249e68c1eeeee01d5790414e2725e98c55df507ff8e687d1a0de41432966057876548c909040289ae1c89283a031fddf333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a09b083da59e564ef6c757634f0128c4
SHA1090be7163d9395f087040e865ac2b329bf57696f
SHA2567465058391cbb053d035a0f4a56a45af6e51aa6e0469a7e24093a5be203cd516
SHA5121b46117d0025ac1ed32c95dfcad2d4a1e6a84185ae1a32e0aeaf97d67fab80139a7c3d85b81daf95caf1af34208d08d3b5c15e663dccf77f40d3efb6b9b7295d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d632fcaadf3d8a22209a482c04512b7
SHA13a55f0222eec63f3b58c704fc2f07c93f087e804
SHA2566acf2cd24d471ddf70427846d183e0c721ff30b834d2d52139d230e478b5b427
SHA51221a22f86472d1bc906635bebf51d5a9a2840dc8ddc662fa695393b37304a8760bc607bb32e166d1587a1d868ecc2211992711e46f2872fece00e0819173a44d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5773cc894e60dd1f075abf26d12a1afba
SHA1da56dc589ec1761ce7ff71d879c362ca5f6d7839
SHA256e0f15e3faa9bbcafd3594bd6385565447e485e71fd0a62d12d5f42667fc0f982
SHA5120bbe808565481da9bca147fd9df0ea19215b6206c413a1cae038421ed7b790b0048a9f2e8cb5f5917b6505c5b9e10da7782068e9d3f39485f5e402ba3ab98557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550a76f7cb404a63169fb9ec228af979e
SHA1872733192d41ae308df883114c4e5299b247c438
SHA2569c2c48858c2a77aec804296bbe883e1600950d681238e45c40385f3ab93ecb0e
SHA5124350cb9c45642b8e19ad8e91da0abfe4e978a6b7ba2c3aa019be9aca33f4125c6276857005c36e126c31fd976d2ca0299d74d8b85f35970c2e42dc14f2da7e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bbcd717f1434f8b54c78fe08bcb7d04
SHA1ca103f1ff0c15c3a97fb596cc3d9a7b3dc427bc0
SHA256baeae0323b0c8c87bb3b087feb795799618dc8539e0fc44278a2a61262a39de7
SHA512229db6c0bbb460631053e06f95d80725d4a581514691a6cce0607672b3040a7d1b504c666a00167f9d18e3dc1307102e97fe71caa3a19a26eb4e3a4e0ee78138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b9ab61f95820667f80ec5f3a1ef8584
SHA1d0842eec81baffc02735dd0281c094908e1caaa3
SHA256f662933be8af92cdbaa22b375a097d5cb58d3cf5333bf255b64fae2d88522b4c
SHA512d05b4ee051d65e75da463c649adc0bd1aa67f1d1560759312b74cb8044ba7b312889f2bd07367db09f3ad5fe350a9260a977ff8d85d2087d116511cc537e6100
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06