Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 20:20
Static task
static1
Behavioral task
behavioral1
Sample
3af6269c3e100162d85432ca271e356d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3af6269c3e100162d85432ca271e356d.html
Resource
win10v2004-20231215-en
General
-
Target
3af6269c3e100162d85432ca271e356d.html
-
Size
69KB
-
MD5
3af6269c3e100162d85432ca271e356d
-
SHA1
c8d259682316d4e7a2f8b44dc61aea5085a86f53
-
SHA256
dbf88ba271a565853b453127bdd0665956c6e33a920f97575d54dc029248e95e
-
SHA512
8cd843efabf68a5bda53b26d113d4fc790a0345f15d2934e8dc7d7073a4984778d1c371dc574637521076cf07268fe3cc46eae5f4c74b20a904917eaad59c354
-
SSDEEP
1536:gQZBCCOd90IxCEJK81cH3RmXVsu4PUj5y/iBcmpnVENNUk56vX/ygH5fJ2Tpjdxg:gk2D0Ixs81cHBmXVsu4PUj5y/iSmpnVF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410010653" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04e961b493ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29AEFAF1-A63C-11EE-8183-5E688C03EF37} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000004a661cc66991e6300b216a01505bda0795dd21d6630315f9e53ed8d4f60bac9e000000000e8000000002000020000000594627aeb0541cae8882d17e88b3226b13712d5c86a89a74dd8f7c56a343524e200000006503e4364c507f71b49429d5ddc4b906fe82ee3d703f90d65a750dd3fc207d3b400000005ea4b7a968223d1df1144d49df21eba13712bfb953c3824458bc65f559000e895de3412706eb8af70186444cd47cfa12cf1272942b07287cc6991185982869b4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2720 1708 iexplore.exe 28 PID 1708 wrote to memory of 2720 1708 iexplore.exe 28 PID 1708 wrote to memory of 2720 1708 iexplore.exe 28 PID 1708 wrote to memory of 2720 1708 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3af6269c3e100162d85432ca271e356d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b0a3bb30c6a44fbbf0b610434da1aec
SHA1426389806f3e790254e046385dcaa6d9da1df1f3
SHA2568282c258a8f7d24a7f5cbba30d5c0a1ba51f9f82be5acb29604e2ec573d84f22
SHA5123ed9710cd512d19a52554ad2f2da855795ef753539d6cb0edda1506a924b61922fe89a82db82ab07b0a926dd240f338a88fcc03a0d06c121248ed1b4a49ac346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c59402555afa24271a07020c4a933bc9
SHA1c73ff92bbc3e8682a0685ff33e4f8e6325767800
SHA2568f446898892665aa4792ff2c95dc2b4f7c5b003f4f18f31029719fef0db4df91
SHA5120d4dc5ed6c4ab686d987170052406afb9bf09f14e843e01ab7476955a4eff00a65a96bff075ed1255648f648321fb449858f4ba4c73c742cc033392707bffa36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f9526007ee497af96f6e4f5784db669
SHA170b8d87926e9064ab9bf0ad95229d402e43630be
SHA2569d9a3c46cdb0b698ffccc4af21f61f8c38bf7c1662526b39b88eec3e72d45167
SHA512920468937a99ecfd3205a54c7547eb21ad6185cb3efa8920db82fe5beff915b22cf26cbb4307d8318472fdcbaa27e84b38a027c78403b85fdce70245ccdf1ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3c81da5cbf567b09c962bc0b675cda1
SHA1c6e53eb0464e00b4836d68c2aee8217888a82590
SHA2563f4ff91379cd543a0979118692aa6e50440d1133654bbfaeeba35c80c12cfcf9
SHA5126911024c20ce8aeb33871390fe7408396ca8812769875d181f2564931c03caa582832b729581106f7354a9bb0bfc26362c5078fd599ebb59ca975295e69a99bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50456dbabc25546a534655c4785261b95
SHA1d6937f042dea6d34608dfdbe7cb6156ab1c2058b
SHA256045ee0e7596211431ec34fdfd26d0d58d9d7eb57b0d0115c98976e4669be158d
SHA5129d41280cc71f668bf0bad176196c1205b847984ca28d0cafe6332863bdb034fdfac4cad1e9ebb5616256129cccf013b1267cc93a36731905391ef7695b354ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc6806b6d94f6789b6d41717f09bbefa
SHA1385810d946f618ac903fb9869f1b89cb21f5cedc
SHA256555892083793cd8c39a7c6a68b28dd262fef4f73aff77a6c4cd2be6e70b5095e
SHA512753133662de1758a5257575a50e8dda380dfd591ccc8f72b0843a8521d98991272e24b04d0e40f5cc120a0d6977dae4511cd69640a555614754f97410a90e44d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524b36395380bee795ed4e2020fb61add
SHA16da21e9ef563fec48eb801fe13eff39ba6340f6c
SHA25634a2c20c20b162705564bab1c28ebf298685f97e1fd8cd9335b70a0c2a6d6605
SHA512b0488c3e5481bb818092bce71c6d2e3a57702519a9c3f5bfcba0a300704204eecb4caa1527c4ba056c592af8b5e8a9225e6fb50b82c468e3ec51dbce74935453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5407bc447ecc5a2581efc90e6974bebc3
SHA1160bc20a754bb6afac51c3e032abb26a54d89fc6
SHA2565190fbe38ba68413c7e959d832e56ee4655fb4364afeb51f1511a191242f00bf
SHA512921baa0ca334d1ca39b5707660df258160a39038763b240436235b351f8ff5eda4c13bea0386713dd8d38c01359e70e77d9efbd66426be5db0ea690d4c6bf090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5357e4c7da6e68f28914e5a3701e11dcb
SHA1143f7ea62d4554d74732ee98e36645e1dc7cfbc9
SHA256ef687884c8d0fd1f04007542b17a9a56a276751489ef6c8a41f176cf5ea6d554
SHA512a047dd5668e72efe8920350af95324a1c9b524bb0b94b11baf5d21038bef9b759586db28b2921b162a3ede4fb46ad95859d218babb5b0be3ea23b896c57e0cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1b48b7afdae171324ab798d247c6b21
SHA10fa20cadee8b8aa6c0aa611fe97177c153b4fc07
SHA2562d85cedd8dc4e4a3422911df315aaa950370d736beb983f1a0997999a1cf218a
SHA5125cb8f9260c3c022dd174d33e1ba018a7e375afc4fbfe774ba490432dbddba2763b6697e79c8d42616adae90f2def7cc504eb04bd60e2abaea6d6774ff14d9c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536ead591cfb53323173b49b20892a988
SHA1c7972a4389b9d861c94fd1843ad520ebe9d9d7c3
SHA256b109d3db79b3f817e8d0ada8e04f14230e86d1cc5451457de25ead4efe02f9ff
SHA5123512aacd72927a204d911f217dce729f46f43b8c0cfe961041c3aef19fffe972cf983b23e2771900fbe524975bf047a7872240623bf4124713b4c27a3f8feb5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5341852b5e0578daa4c114aa5f55f9f6b
SHA10b9d7b36e12a10e9e38788b25bf6e6c43e136900
SHA2560a4cb3d38a8d2f976b609caea0ad4f36cf915317ff299d8467e51a061644cdfd
SHA512afeb16cddaf37a7988803468113bae649bda05bccddd1bb7a947c03bd192c43bd0558cc15291ba9aec8bdcbbf8242474cc06c04820b4e9437bdd17996437cd42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f7dfcf5171a26dc53caefa17734fb1f
SHA15cc714238ff661e9aae59eb8a77a84be87dac4cd
SHA256f694cdf26314d4e864be5ba649e6c7173f029c75ddea7827e6251327c7325822
SHA512807693573b2839e7ea19ab8d5db869251ae1c4467b057129bc22231dcb38d68f3fd325a43e0b6cb73de50970bb093514011e0b967e183e5eb315733a834a695f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f90a5ba212a8a640908f99ac18872f9
SHA1cc7b4b1e679806f56d3e25adea8610ef3ae0b107
SHA2565c7de4d39a1e7bf3d1cca68bce425c7b79c188974b8df369eee83c79a9da4199
SHA512233456f50f2cd073a31c95813be09903f32a5207463c37951baaf5c0e61bb62318e364c93a236633ab61ba5359e573fa81287bd235de09e22b5e3fcfb30b792b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5521448a1e96e9b76d2d9a77c5002cf8e
SHA10d156c47b3ec305df81c331a9cf3bfad8c5187ee
SHA25676a42d2d4bd10c3ddb246bb91f1617e8ad60a1663efe5262808c4560d48bad42
SHA5124a9bff3bc18d29f83ab913ce6e37b0544353c483190c1ee4fcb759ddeadc022402b81021792808d5dade8da96d25fbd2123a1f8f504b113ece6fe49b3e5632fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff837e830a21cd014a7f5dc3e6ddb35e
SHA1e369b8b34c51af0fdcd06e9e7c9bbabed52b2550
SHA2563bed79ae83481f78cf501d398d4dfa6c3980a50c84ebdad11b175461ea4603d5
SHA5124d1381c9496fa65a08e903d998f4428740dc9a507f710bba4d88e274fc3111684fafc48a8d44f8e850a9eb48f8a210a585f84eff3db051636276195f9fe0abe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d03f5ddf86d03621636e2b9835419d8
SHA1e379956ab8442385782afff99c749ea1f7cb08c3
SHA2565d89e2b898ffda211b829f149245ed51ed9f9dbe44af615b503833bc682c6238
SHA512ed5a69778fd5adf6275468e6aa9d4f1a320723fdb91adb8b9ea9b5146325476b7bc390f964bf343bed964132117e216c070b5f90b835545829e779b3405c8c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb0312629af92b757bbe84996400c49e
SHA1c26073f284ca735db5938ed71ee20af88077843c
SHA256eaacf4907adec1274a5f2b8a7f444b743264f758b788e075fc07d70b8b6095ce
SHA512152dc10f4553a20fc0b02a572fcb1abb63831dc2c674e1adb21c9205952bc685628889f6c76e32393626fef73c808fbd11515517f12362b4abc8774d5c2a47fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554e0fe293a90afd50f89fc10dc718cfe
SHA10da5fa087f52b9cd07f859342fad64773ad4d139
SHA2564f4f833b4a5d5e59770b5320d2983440efd7516d54364dd6fac7627386254ba2
SHA5129e8cca484373e1e11879dc1e03502de3184261950b8d924a5a894c69b5b65380a2c974388ea949d84af546cde9be6eea082ae7663b669d7f315a73b3ed48b470
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06