Analysis
-
max time kernel
117s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
37c655a011ee2c3faa919b4830131897.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
37c655a011ee2c3faa919b4830131897.html
Resource
win10v2004-20231215-en
General
-
Target
37c655a011ee2c3faa919b4830131897.html
-
Size
3.5MB
-
MD5
37c655a011ee2c3faa919b4830131897
-
SHA1
261e2fd410da0138918a32d9359e25ba78b398dd
-
SHA256
7ace6acf79dd12ca22776862f6986eb82e30f2a7f853cd971d45b79f917dfc60
-
SHA512
e020c31037266eaed70873696a0bdd125c70c55b621d47d51d9f360d9a76f56daa006eef4105d15b22624dab6235088fa7c1603e7e4429b514b44c5254480280
-
SSDEEP
12288:oLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NfV:ovpjte4tT6NV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000000eb144aa114da24cbf7acfa3f6927fd86ad193ff3abc79dee5a01dde17ad82c1000000000e80000000020000200000001bbdc9b15f413d8127b79dd305072090cb4556cc339bcc5b8db462a77377a653200000003d3669b7baec0b03382c74d04337fff2333bc38fab4211fabeb1fae97ac2df20400000006a5ab92155e88f463e6478df59452c245bea1fb6b98ed224580cd0edd40228f2ff59a0c61525fd6b814d3c255320581d836860b1aa1e36aa7ea4b6bf03e056e2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409774717" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4DD0391-A416-11EE-8CD0-DECE4B73D784} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ee05bb2338da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 iexplore.exe 2624 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2648 2624 iexplore.exe 28 PID 2624 wrote to memory of 2648 2624 iexplore.exe 28 PID 2624 wrote to memory of 2648 2624 iexplore.exe 28 PID 2624 wrote to memory of 2648 2624 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37c655a011ee2c3faa919b4830131897.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdd204879326e1ceec16c321186e4363
SHA101ca5ed5aab8dc0ff0e41cfc8e800174de6d581c
SHA256ba5676b891d989e9f682f474b6e887ec16fa01b1e98db9c4d6abcb41144a1fd3
SHA512273ecbaef2ce5a166a82c3341c9ef2ad32a824d84e4db67abaf263a1ce173a215a2576c75310ea52f3cccae629088f7554f72ef4f94bf09a58f8068f5975211d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536ae4f7c7216e4e883c541adfbc518a8
SHA1b750fe54be8e0a0bfc2517828b81ec6d9569e400
SHA25614450745f1aed5b30bf3c27927f3c83d71eced794a31efcc4fe1d21e95330d03
SHA5122af50f73168b1b7aa2e656a0de5518255453406a99e55b7ef854aceb1a41c5566ea60b0c86792f9e637fed7b05927c97787dc777bb0f21d5fbb6a9711ce2f5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d419d02af59544249f9a2466e61eb2
SHA1ad75e00e387c9d7a74cc884c5cce9010256465b4
SHA256df7e7da22f37d11926dc0f83a6d9be6a1285aba2eb66a1d1870d0febac9f2119
SHA512b16692da0b2bbdc7cfbfb7aad0155031ba7f05e11f101d6b640cda4faafd1b309cc41921ffc45c58e8c851c477c2839e4c396c40546ea6eebda3c912497827cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5af11feec9a45090d87c6dcdea1a706
SHA17f561a14dec326bc36840392d9e3d3bf633b92a4
SHA256c0559b43995297e4f8b176f18bd92d4bac9e5a9dec90e9c32f26c0e5572094b2
SHA512486f8df69a0c36db927a7934874cc5d397eefe8da8ba7c984d91bbdb94a998619d7beb9bd03e9fd184e376f066ec9b7e8adaf512b64d21b21216210e028308a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8cfd65119a2406f83e01da24ae79528
SHA1ae6eecd0e19f4d8a249034f7ab934df13278459f
SHA2563fb89f2e44f1b2628c65e6ee93f02b64ef978aca9ee61c6788b9998ccdd9f690
SHA512310106482febc447e13cb7ae611da5fc6d32d9e7e19444f804d5608a70d1340d5c51b41b0bc0e75ca962136bd100be172432d412884e93d31f5eccb09a71488f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adfc82c675daa3621b46decadbf5caf7
SHA19049a86318a665a3df510278653e2b0668ccb05b
SHA256d984628b1e83483d27c71a783ae288bd4505a2c7a95da072c11ac03b1e040688
SHA5120ca30b95e5317d1ece01a0eeb3818c9ee18ae18532c7778d136e7fd559419c046d229b7ab8970acca060a30304683a2779d19e6b373111f6954cda40fd1fcc98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587bc7c679c213b5703b6e3aca52b67ea
SHA169e69cee29e52dde0bfbfc54b0da700d8d229f66
SHA256205651387a47340d5636b35558f34168f6b0ab6f9b37ddb46833e536cbe4ac74
SHA512b802128e005edd3de4dfb1137066b71faf40f11cd55d5a4bae3808ea1e4e5d7a02598c43378fe4391ea8067770eb392517cf9612491d9ab72594f597a22dd00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5fa3fe688e562cc9b152a4c9b10b1b3
SHA1821b76b93fa3201f58d2fc73a4aba38c2b124b2d
SHA25628a3cbf82c1d859af62f23645c1efd36c9ac3f270c6c701bcf7081527257f8a5
SHA512863e1646916c83ff2f9a7edce9c49db4a79ddae16fd7bc2de67794db13c6b11406c11c98c7fead5a6cfb0c9383be70fe9050bbcad67a01b6ab3eff75184e95df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f13349f0ec5951cf5cbd1a41b71afb49
SHA131cdfe7aed6949392f47439c5e601956258cff49
SHA2564bd29298d172c64efb8a1e511db1f1851812bf3bef15b09e4b618e63423a2e62
SHA51265284f5a759b76a5869676423def975ff945ade496f636eafe3ca6e4f0058570f94d7b6f81be2e5df5c773733d682c0ac11581cc1052a9e0bae850ce09d5bf7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5469ff46b1eed71b174e65b94cbd4eb9f
SHA10e781c6d12c587deb08f4587ecd2051786d5b4fc
SHA25635e6001685950d590624bee711b0671ddb2db21dee68b54283f3120305c03a1e
SHA5120c874d7f5ae0fc37ea746497b13a624d7f213de9ae320bcda58d2498b401025b2deec5e5f0075d9a0c89d08268b51428d0900cecf5e344f5cfc0f50db3f66051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc864bc04c5ef8da3f8ffac88326ccfc
SHA1dd3cce551b486613b8cab983669e4216e0170bd0
SHA256962480a566af7c21adfc714449f1ddc0d276afe6c955db069949d318026cda8c
SHA5123d07c53a89df8c5d468b854dba267430646e1b035b95340ae473e81d263f13b787e8e0c148fd3a877d139f04251691af1b04769ffa0ccc5a13e181283586dc6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccf434fc9641a12db41869b807e45ddf
SHA1fd48d3340aa3b1b383d648c867ba45ef323153f3
SHA256ffd39088d90d21621ce8b9ad750774e1a3049144ceeb4bd2f75fc0f75c400560
SHA512d356c36425b175ff58ff456ec96b3b41390a93c860b1d3f21c822b2fd61412cf82153039c067159cdc4dad3e8648ae54b0adbe3b01cce450581cd1fb742c518b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59964f5349a65f072f4c59c04645049e0
SHA131483143abc60ccb93a250dfad805b230b535cfd
SHA256a06d8163fa9317b70e04cf32266ace9f08f15a3a89cad565d86a7bac9550e334
SHA512bfd2a189d8f3d5253eb323cfa954d751025e9f651b2e70396a43f7bb08c2cd4cdee999132ff6767bef5d1001370743df400c9992e45afd164a269b44d81508cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fd66bbce60f469e8f1e0b5b4b2154e3
SHA11a9b4d192658c7cc459e21a8f92e52bd957c63b8
SHA256c14b4549f5a2332aef1b5dd966f6a13947985407d4937bedb610b989628c6d03
SHA512c566a4e1ba174c8b51a392c83c684817687d1eaa54e6eb3c588d1e400178e38538e05a1df0129c012c89698aab04a9c54f5831805d90dba1190b24265c8546de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d67e481c759630c3f2553b1e6b9612b3
SHA1abe95110ab39bd68b0de1aa40f837d88375a7d77
SHA256b067791354854492676cb90cc509a16e48a7beeb73d4581b48a3f541d7169ec6
SHA5121a1315545b43d7cf40d0d9b1d223a3bb613995248bf57601278d5f5626702343bdabd210890bfb8b0579a642fcee6d34d6855777babd9dfafbacdfb9667d06b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5558d5769a67accca8f0a9880610241a3
SHA1d121e9c8da167d78b52aebd46f340b72d832b50a
SHA2565a20ae9ddc6894884d16101a241e6bf2cb10ceeac97a5858f69c8ea75adb71a3
SHA51229e8825311fb860c4506115dddaf6d71424526052da2c843c2045985f15146068a4f5216ce2fdc913ec82f1bc996f675a744a06fb58257f385a29e279465d18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e6d40e2b2d0430246366862ecaea51
SHA155125cac86fd979c873f74dc964f1ed5c1a7edab
SHA25690731521434c35ac8f53ae3fcef57647a74a18b7d3fb8509f49eb729a60b6b17
SHA51213ef9a8b0fbc18cff67434d715a52b0f4b76162481551c5904a6ba2c1ac7db95388acf1afdf12f4833fc248faba9f5ee800e1a9cf64c2198d45c5570d7535ffe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\jquery.min[1].js
Filesize83KB
MD52f6b11a7e914718e0290410e85366fe9
SHA169bb69e25ca7d5ef0935317584e6153f3fd9a88c
SHA25605b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
SHA5120d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\beacon.min[1].js
Filesize19KB
MD5dd1d068fdb5fe90b6c05a5b3940e088c
SHA10d96f9df8772633a9df4c81cf323a4ef8998ba59
SHA2566153d13804862b0fc1c016cf1129f34cb7c6185f2cf4bf1a3a862eecdab50101
SHA5127aea051a8c2195a2ea5ec3d6438f2a4a4052085b370cf4728b056edc58d1f7a70c3f1f85afe82959184869f707c2ac02a964b8d9166122e74ebc423e0a47fa30
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\jquery-3.1.1.min[1].js
Filesize84KB
MD5e071abda8fe61194711cfc2ab99fe104
SHA1f647a6d37dc4ca055ced3cf64bbc1f490070acba
SHA25685556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
SHA51253a2b560b20551672fbb0e6e72632d4fd1c7e2dd2ecf7337ebaaab179cb8be7c87e9d803ce7765706bc7fcbcf993c34587cd1237de5a279aea19911d69067b65
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06