Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
2cce54f78b9de9d57599d234cef0fb46.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cce54f78b9de9d57599d234cef0fb46.html
Resource
win10v2004-20231222-en
General
-
Target
2cce54f78b9de9d57599d234cef0fb46.html
-
Size
122KB
-
MD5
2cce54f78b9de9d57599d234cef0fb46
-
SHA1
dc5847cf0aa69ff1833c60d8d4cfec092a24cecc
-
SHA256
dcc54e484c4f9eb76f7ff4a9046df602ebe672768f44d2a40624395c4480851e
-
SHA512
67d40e4e1af0737d9751f60d07a58089dfdf55943c90273504ce0e2f283f4e4149f82b8aa210ca5e151d08a49ffb09bd9ca5aaa0387ad9e82179ea2f3e994b56
-
SSDEEP
1536:kaSYN+IpK1ttU4BSPtPgP8rSHakkmO/82KvDKyfVEZdAyfrB+Bi/40MLv1D6lf39:kaSYhjSURhUzbbIh1/rWHk/+aGFYr/d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c8273af237da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{458023C1-A3E5-11EE-8AED-E6629DF8543F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409753433" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000008f08a907632d67a2846a9cdd3ec214b4bbca6850a37b14fef7abea18868d09ed000000000e8000000002000020000000d96cfbd17e02f2908a35bb0f457197c41520c013a958d29403caae1c24be33a520000000920028a5fb2fc029c161cd546a40fe7435265b6dc0c9cdbef42ccf0f3579ac1540000000c74c84bd7b7f4e9a683be0a8b530ea106e26c8526983454201d558b3d28b2fd6c7528947d6491008264d00d7ea457a3aaf877643bdc4f6e3b4a23acc7c5746bb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2764 2140 iexplore.exe 28 PID 2140 wrote to memory of 2764 2140 iexplore.exe 28 PID 2140 wrote to memory of 2764 2140 iexplore.exe 28 PID 2140 wrote to memory of 2764 2140 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2cce54f78b9de9d57599d234cef0fb46.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5322abc1b82c3ecdba80eaf8bf54db697
SHA1d5f4ddb3c546c9376a96df03e2755ab4032fe793
SHA2560770a523b56424ffe8f80fe5877b7657a20ba7dddaa8d97798efe7a9fb55284f
SHA5127c0bb57b4aceaaf9993d6d1e05a9d823a038a8b7335950c759c0987ee867af84382a8ec76b3f84356e4d9fd26bcae3996ed52e468c0d1cd1ab5d7d5d1d0b644a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e778dd21946c88d94ff91d451f117550
SHA1e82f9174757de3c6389d93c4f819feeb009203aa
SHA2565c83f016a446001bc7c62c968b9520af285a4530ce86ffc8c6a1fb9c0823ff17
SHA5126e95f940a083c795992c45cd5e45f949a8ba77ab881e8e31d99cbcf492f42f9013a66ac2585469a3076724b2e08d6adca41a3c246f628d0216232f1486e6e86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a10f3e3c1b37004dce4b53a7dc7dc9f4
SHA19f9ecff364b35beded2ed097de5854f0dcddfe63
SHA256ee2b5328ba308201322f7bf00e377bc65948b31fd8decba7f950648d4eecd0eb
SHA512294b8feed63dd842fc68d219e948e86dbfbf6e81637676859d8aab4817e979b5168be292fdafc064138cc6912d5d2575bc2148aecb54bf9899ff3a408dff8321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9fb701f765d8c526cdfe39fed3a5f9f
SHA15b1209f64a2ad1d221f8021bfb27604ce7afece9
SHA2568eb3b44797ddce689e63275b3c34f8a9ecc3c06a7d5cbe456835d9886ca509fe
SHA5121081c85c5e9375ffacaf4f5fed7c40db4459b19efc5a247360487a7d527aad1f4f94f9d373402231be1abcce3fee30958282d3d6a9ad6341fbbbfb434336b2d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c9efead9014cf77b2600629395aaf17
SHA1696160cf89e247cfe81130e29815f10ee005c11b
SHA2568e373814c20d17a773244785195195b9a34a1f1d9fee2f2a05099ec82b432020
SHA512d1cce34b1750db5939d0c8146aa9dcdb0fbb6fde5e12d708e3e97a6ea7d491ef53b7ff37b3fa318911fba6d3ee564203419232a110024d6b885f34b9344e8e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec3833071be888028e86981cc0505c95
SHA1dc871baf7b32c24ee51d2895390f34f9593dfa7c
SHA2568807c1d5b1bbd05aeba3e67520bbe9f87a49583becce90bf3cfe3294453e45c0
SHA512e8c320eea313895892d282d57e3e6b656861d8bc284a5dcd9e4442c44d3fcd6f5c9c1a32f75496b5b526a00c5446d46a40f8f85b0d0f37c9cda396c75ebb4d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5c750c020df51f6551d6b9219fb6b79
SHA140dae461f39406e3ca0b56d81dbc44452c024967
SHA2561b7966ab1793cc7ddfeea5f23b1fdbc9e470428c7980eafc88aaa0aec912d020
SHA5126ad0c0eadee1b6679e5017086dae65a53a3ddf83720a2d2be25293b4482b1b5f99d7dd71ab0468ad591458034fcfbe8a7262c5c8068fced4e349680daaa5b3ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d8305efdbcd09a8ac88e0af1c6f760c
SHA137c8910ac5eafbd70736c5f2c83dd868dca252b0
SHA2566f79858c5ed62210216e6fb1b1ecc5c171c84d44082288c106a76b356b828439
SHA51218fab64541ebbdef5f4c5552a263ca5a828098ce10e7679bd74e15b36c02481e455f8d2d33b5a52bcad3d78a2000d2101008f409f013d8edf966ce53e9e7948e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f33ab16afd731ffcced2ed696f01e767
SHA1a0993fd896c0fbd26fbc315c773ea4d4cf44a361
SHA2560d4f722f326b0728fc9ba7622ab05d79be7300e770b6036516976e990ab6179c
SHA5127e36d19f1f6116f69254087e3e02aa1881e20d8f1420fe528a275eacf630f56d8324828b2a24d2801b8f15609e85c2a24cf7ce8359d8dc0306d13c11f9c060af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540700f3548586d8cbbc2e39217482dc5
SHA16a2f757b466fdbf9a5b7b3a72089af25bb98475d
SHA256c0b96924f57e87e6e535a1045878616f1d65cce3a69df7821d74a626ea41701f
SHA51239046d7f0c62dea57cedfef5cb05448e1b809a085576f83530a8cb2bf83e0f824dc798433cadf347baf1be31c1452b4296ed8a6408d0535cf4e89b64f4a019f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e517f2bb260c0a5e7d908d03e61e79c
SHA1f95f13f231e4ad4619c1addd12138847427a94e1
SHA256a4d9cc9af716f150cf94a471c3d77d2ccfff1c2981d2c80287aa5d7896b0e66c
SHA5121dc58da1f6f7d4c46b3bd11ac57644cc7c50262f843c43ac65e66f9606d8f33ec7b8b06b9a8e95194c9d0681bfb3c05efd0e615abb25b1d9c5c074c85ff989f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563e2c74a951d970f51440a29edae4548
SHA1baa308892dc3185f1badbd63866718bf32927d44
SHA256cea469bf6589af957e46d393ea8d1fc34142c151b79cfc74c72c99cea919e48b
SHA5129a3032bf41ce94df79fcf4b51b922dde53a2f65e8ebda77b2163b6da0bf1e542b9ee6fc94af5dc0f2689c30449e3e1a19c18a2f0f2b3041e4bd8017a251b4591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5311f0c96856241a7d70e3b33fd2f12a3
SHA10cfd4d11ff83a6ad15dd31dec2fe1624cada7473
SHA256dfde7587bfbf91af41f9d0920757a23e0facff7eafb3d391e539a1b956fa7e46
SHA512f88bbd6982bb71d4bdbb02ef0d8fa5267a46f33faf5b94cc3fa99a407e4da8c6a182b44aa4f8bbc9abf8b283490d9cc3b96f0842787a6b15287e15f6fd3ffa15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d01a7b7ebf74b02375849d22ad4bef05
SHA13f8cdbd13b7b945800701b37064d078e24a940f0
SHA25680fc34b5cd9b2640e97abe7cdf17197dc13cf0f8fd0ede9af8a4f698fb220208
SHA512a790f45e387fa2ec0cb0c7970184c8a8b2802432810864b0a83c3cac216e0ee44892017e67bae24280c9e52ec640ed93a2bf186ea9217831e159fc38b613d1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c00a43b3ab2405a9057278fbcf67d9f3
SHA157f84995e88515facc07b8397298e5667800f12c
SHA256658be40f0037ec3172b0194e20e36a114b799023abca09ac5dc9797bd9757889
SHA512cb3c61904d8befc2ea8cf74d43056180e4bc39f65a099f1b8e4e333d704728d029edef3d133763c947aac4aa2440e108e8cb9f0017ff8ab5580a2f81dcf978c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5212bee6903df18c5bfd8c30bb874be7b
SHA18178b7d275336cb77404561d675ab6a42ad62b23
SHA2567b3c6e0186e4365ca3f04cc90960199bb9db4e4606a22f68bfdc31cb985fc16e
SHA512132164e72f0b08dbe81c033004b3d820c98ae7b34c2e8ec18e48f32cf32c4bcce5a24b85620e35eb793f78fc9b4a74a949bc283801ab4bdaf9ef538e215073d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b706d4541fccd34453fd409c1337a14e
SHA1f6febea126ea2464945f54c550524471a65c6c5c
SHA256de673da194f467fba68e7902b95e831f0ac09541bdc263ea064588a6ac209614
SHA512db2591756a67c935473b0f791ee4a402d8ba4504d63f073a5525523a2882be7b88589943e067dc74c754e876b88b5db84c98d3e01cb76afe528c8fe662279d11
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\forum[1].css
Filesize5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06