Analysis
-
max time kernel
138s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
3146bca47d0e5630d17705256989fddc.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3146bca47d0e5630d17705256989fddc.html
Resource
win10v2004-20231215-en
General
-
Target
3146bca47d0e5630d17705256989fddc.html
-
Size
36KB
-
MD5
3146bca47d0e5630d17705256989fddc
-
SHA1
11c1324b0a8fe539932732816789ac023fc9cf07
-
SHA256
7a82d175717b9213f06cdf5fe57e99662368c2862afea0537586194a93e61cef
-
SHA512
15db04c9c8b3174ebf990908430e55a89b4fae1b20feca44a1123135bf3f95897f7ba2635364bb5f3bb2ebb0a747fef311a1bdfed76a143524ced7c8169005d9
-
SSDEEP
768:EmTsbnDAHOvGFOzG0aW/u59doaxq7xO5o2KXmE/wkVJrFxSSL:/Tg4OvGFOzGdW/u59doao7w3KXFxxL
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000007d95ba2281710ebc2727d7cac1c594d8faff95538ff3265d362142b2a75d6fc9000000000e800000000200002000000002f6f05cefb36810824e7cc12a61e25885e482b1df1ba5d474689bd9f703f0b620000000e127ed92852dc9e070e8bdd032adb24cf5d6d28fb2678370acd479092f04f2c5400000002158a75dbda18dd21cf3352841a8ab637db493466170c9b9af82aaaa118f85eca42ca199faddbf177f9ae7e22e61ddea7158d57de1a35b707fee80aad6c6e2a5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409761854" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1B9EF61-A3F8-11EE-B36A-F6BE0C79E4FA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c04fc90538da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2628 iexplore.exe 2628 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2844 2628 iexplore.exe 28 PID 2628 wrote to memory of 2844 2628 iexplore.exe 28 PID 2628 wrote to memory of 2844 2628 iexplore.exe 28 PID 2628 wrote to memory of 2844 2628 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3146bca47d0e5630d17705256989fddc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bbed77e933c5cf27b022d89398e269c
SHA1548e30b484cf4e7f4c348191a539240c41a007e2
SHA2562703440548e3c423feb546c84ee7f889adbfe45fa6b6af78153966b011fb0b9a
SHA51218e89d1bd53a510a00bc0a0c0d695696740436a3107d9bc1b22328c30733f656a271340bccf518cfd5291fa48a83c05cb39670c757643910c3267aaa35987d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aa17b133328a3818a3ac8a82cd28177
SHA13c0935f0299bab78f1cac7cbf113bac69edcdc1c
SHA256a52b560db611d0405d7300edae7bd37eb73abbe2ef635166dec91ba35dccf00f
SHA512a5a6d395d5b22d66e566b5413827f3253241c04654cc650951d66a5288b41debd8941bf123238034bae55688a7cae577c618ca6c4b6393b5e14490b7b1027792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57012d6a5a574d817a9868a9a14177806
SHA1f434df7eff98166798de05ed2e965bbb0158541c
SHA256f93ad670544eeca85a422c9a1594447879bf26e94ae528af7378a68501e3ffe0
SHA512e418d7d748c08eba8c22347bdf267dbcf9dd4fecfd3578a697ef5819da20b548159ab29018a0102bd6c6621e35f7c2759d85cef2aa92bab3b28eddc1bfb206ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a23b984180e8a866a622752c7f1282c8
SHA158b24bbd9ff4c9ca92bc3c9a6bc4e1b66572af71
SHA25603348f0ef395a22b0bfbce8d857e4c43f65144e79ef8deb365f86d34745e88de
SHA51209878d5ce6b06337dcb851c5bd79457b3506af6a81269d553c88fb40d85bd10fc1cc2d89ddb5365df74fcc6d2988582bb9b4567016dd98b8aa7de56199df34b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510ffa1db447a6e4a195a95068d1accd1
SHA12bab1818e2bacb14563a71c735ab333bbf9e33ce
SHA2566db8740f3afb036a8116500c905d294ea8726fed0bd7f271c3927f303c7244ba
SHA512f9ec00bea312ebd6e29d539505104a66df42204c5df87bfa27282448c60c956b8080c2fee3d3ab0d61e2aafc0c5afb61e4d67e17ad6a0b2022b2264ccfcfd9ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bccb8a790ec9fffffd3941cb6c85f4ec
SHA12a29cb55f65c23b7c6b097fcbb1bcc75d4202bc0
SHA256f95d4d40ed8ce56875b45376eb23546e6028e3e2ecd12f1f787e1a5fb85696cf
SHA512ee92e8f7e96da0d9ca29418e7cada54b46c04d4336dee7b82083a72df55b335815f4fa4a7a4753ebd4ae5c739e1e9f94466a60777a2d92cf48feeb0d11bb5081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efe0d42079ba7d0afb0a24877f96d544
SHA1f4a2769b8fe19ca5633c065a682d7b202bc13e34
SHA25630f6d005493c89a6ae537ce2f0bac20711e8f6a516652f07667d9d2ad5f284c6
SHA512ce4ad3411588f572d146993811faf826508da9805e47b9f4c5c9b374ffb6be2fffe395553b4472f41fddef1c3290da1bd9c203270def56a36077c47723205a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5735d5c378847db2a95347f89554c7c7f
SHA1f58822e0fcf7441102b31fbec48584631f4ff6b3
SHA256632173742a42ec04c0681ef759ff9ce625a52e90959b04bcfed731f62044de90
SHA5123400bfc0f636a089997269314b5efa3aa100b71d2980fee3dfb1590d1587a98d1a08ef93e0fb3e86b363dc40f7fc6123fe23d1a1af269be9a2a793cb09475641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd67cab793a3dbee79c3d60e413b7bdb
SHA1e951906e3059eb7637dc49cdabba6af65a6bce8d
SHA256db49de67c0e3b716dbdd1f9c16a5b24ec6805f118c771e17b2109a4cfe62ef02
SHA5121da8c6ed9aaf570b05107cfe60bd5d6e8f157650dd737ea393e5737544d8d1afed088649568fb50c16644ad85761dd2eb3c3e5cf573c4c73b8f767874d31b490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563d2fa4d84d2cdb0e7518a2cf0656f70
SHA1d79d1a84bd651c60a749d2fbe595fdf5bcf694b4
SHA25682a32d347924b7ca1dfe754695d948742f62b1d7b705df27242cd19bda56daaa
SHA512c4df0f2073d358e172e607f2b707135ce90fa471aaae23361b5427c163ca9af28b0b7ba386054623206b7832e0ba80f4e8dbbb6a6a8965272f55183ff6685278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526e76031797cd7df3404600df9500fce
SHA1ec4d84ce8daab92729f519313df2f82d984775b8
SHA256159284594a514aefff865f3ae057fa245b515a80d12855758f52102e225ab010
SHA512ec31d47c80d9eff65338ddbdaff0a3d6eb197c157ba10fee2cc1b3e6cd32c939cf3f8dd081fe72c746e3950e5ef3f47c56d4f15a8e7646f8d122a2bc409af239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc7cdf3096f29c600c9cf6dad9d0670d
SHA1753a7d982e12d23e57e4f57f917489a2b0b76359
SHA25631e7a660912629a125ecf130abc6fa35bc2145d2ef85e6966bbb1b277c1c0803
SHA512c6faa20ab1905fad10cbfd1feefcd75e20ca1dbf75a7cd031e35c2baa1ef1e43a3983b62d436a0935d60320c779874b980ca0de51b773fe83964423277336aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0d9892c9ddf7c39dc2d6c8a8b9f9c48
SHA112d1e2708ee8aec2fe820cd45eb5e62dbbb3e915
SHA25669e4258d363fd2089c2039e2645473d7b80a24ccaf925768ac7d145c7023bf8e
SHA51295b6b47206c307d9ff440c0d9c87b3359bc565db40127150f525e99d186b4ed1ccce0632c00c6f41ba94180114359b7f7e38035b54dab10462fc10c1b4a2ec41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596284f77489d6620acf83ecb8fb37f0c
SHA1b7c5afa05b542cfa1dc87bbf3cd00fdfc94ce786
SHA2561166f0c67316a883eeb2922c63cfe018ff4060f5815fb09ca0ed37a9650cc820
SHA512034675eaa31d8be1fdf672ece33dc2bd09445c22de4d42d6d0c666e05b1625d203bfccbd5180ea9809b4549e4080e76f0352608a8486265bfe331dc011a21d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591e6f9267b6ca3aab950fda1cad5884d
SHA10552d20395123ea60f7ba04db5e3d8857d87612c
SHA256a8066b02c66003905b6599fe5934d016f956ba94bb96a1c0d7951033ce7b1d53
SHA51254e372ee9348974340c9ac391a2ddfcd3df06caea078b09021e5f73cfa7ba61c1368b3b9d43ab56d926194ed365ad471488fcf90a103991565e72956cf475627
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06