Analysis
-
max time kernel
0s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
2ae64315f7c2f90cc3f7129e2c9d3298.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2ae64315f7c2f90cc3f7129e2c9d3298.html
Resource
win10v2004-20231215-en
General
-
Target
2ae64315f7c2f90cc3f7129e2c9d3298.html
-
Size
3.5MB
-
MD5
2ae64315f7c2f90cc3f7129e2c9d3298
-
SHA1
41d09ddc1b9d74e7ef9ad2638271992657e6070c
-
SHA256
0d87c02fb03f351130f02a2cd3aaffc214c75885e731925159dd7ded13d7cf60
-
SHA512
ae5cb7be43100326c356aebd3ed1e600b2b8dc38fd92c2557bd352097c4d469286cbed70d152d948238ecc01ba4b8640c4a8276492c83b022dd73a5bfa0a74ac
-
SSDEEP
12288:jLZhBE6ffVfitmg11tmg1P16bf7axluxOT6NAf:jvQjte4tT62f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CAE38E1-A3DC-11EE-A68A-46FC6C3D459E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2820 2216 iexplore.exe 16 PID 2216 wrote to memory of 2820 2216 iexplore.exe 16 PID 2216 wrote to memory of 2820 2216 iexplore.exe 16 PID 2216 wrote to memory of 2820 2216 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ae64315f7c2f90cc3f7129e2c9d3298.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5eb1ed4eb2eb4e55d459744b9fb4e9bd0
SHA1a3f1110806134046da508ba1288e30bf1cd92332
SHA256897a40b340a74edf78c53e115613185c735e1489112a776f8c0d16f4d9701971
SHA5122fe0a26cce1bc34fb4b21da39b6f94832cec233ef5fdd21b16b3d6580e0f49a552cac6b461a1ee31d5837292c4311eea35519f47ae6096a5824224afcdf778e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518b7e95273ae76fd0d290389881f618f
SHA1624b6e1a333397ea88674214c55c9bce385b7df1
SHA256451d90f3008675c67b749d9adffbd96e067a39c100b1a17fa183eddeff9fc983
SHA512fe3152bf40a058cdba51062dd0400a32dc07d4c041d95ac95c4effc66a8d130c6da5b1a0f998a238005e157fca8d3a3d5d2473bbf60c4e45f60291ee561e6812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5227bcb0e4f8b92ab4ec3342bac4fccaa
SHA15dcc50ede4380150144a15bb9e6c0edfdf70e6ea
SHA256c2caec8091a234200e1d699b32d00d2691370870868b09c02a976d87d2d3d8f2
SHA512955037b2b1bfc26575187040cc1d02974cfc9b6bb36d1a8dd0381550c695671f23ecf83b14b1bd686ff641ab58b53013cd16d990278d502def6a8b7bf51c8479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581e5d71a10520752cf91a11d6c92afdf
SHA106298062d44cf3e9916221cb20e93b11017ef06d
SHA256963f5de914cb6f97f7efc5a6e43a1f12b6e5f641eb94b3f01f991599d5958af7
SHA512950db40a2376c0d7b8170dd5b2363cb52c4eb9c6413afa377745c5753813bb1dd28d7b07e8dd9714dd5513b13be2aa472b129039ca653c8e333a4b29df2085a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d4c1473732db89d429b374b826d08ec
SHA1dae8845a2d8006eb5b6610d7cd1b3914677227a2
SHA2562d5da2f6d21e627ab86ea830ce6e0e4ca52c792c86f19e7677aaca9ae6067de7
SHA512e37a62e3aae6d4ed31061f7250f8d4931bb7d400a124468abe79233a6e110ba1c7a1ebda9d8b866efda5c0f86fdd6ba6660401bc4db3b12eb868fe4998a39f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2076d271c25d59486cb0e1c7a8e5712
SHA12e0c4efdd42e8c87b2bcdad81ebec55eb5d4c425
SHA256f63458214bb4c8db3884aca4aab18d04ba5007f807a1c9ee59cfd324f9ed9c73
SHA512fe296bc2e409d45e7aa522cb1139c90baf70b4335720b069bfed430c9d26b018ad5e5ae5a004aa70da800874b7d508a153adfe9f1c4ec24d059ae5c399b7026c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529d4f733236c084512d8ee6e9c78cde7
SHA15e09985415af0bdab1f25a891363c5c1e8e9563d
SHA2561381b45378c58e522bc4da7bfe21b7c1f8054c73a8e371f184cf5ee5ebb3cb31
SHA512a4adc81bbb7a51d11bc28a6e27aa888fb2b67ba3555dadbadf42c88166d1eb83036be7ab4b7a9f9e98fd4b9289365457e7c029466315af77d2ad7bdc10c7a234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cda1ab715b28018dde1d1bfbcaed963d
SHA18688eaaf74232b76d3dd5cf076523d7a902db423
SHA25667361a0f3b82aa225be606b09d0ad32d4e1f868201ca75b8ccabda827741b42f
SHA512228fa08a3aff15ffd95bf61db4d78f4b59ae9aa39a14aa2e4963c014d4c81cf6d8533877cd1befded32d893a130b212d10125ba55c78fa31df5b9616cfd5efbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e6f3c2f3c6e96e08d21a68d88863596c
SHA1a13ce70931ab5b52d6aba7dfe4ca5da26eef4e92
SHA256e68912cad5cd839529770b6ccdc0c8a43851976e0ea5199400a3143767e3d757
SHA51217b0bf52fbfdb1add036f7c3e79f4cd2b03c7efcda3954367727d8a0eeb9e8aa7a713efe715b50ac34316e03cf1b80e0e4699925a44d07821c4f9c28c380d286