Analysis
-
max time kernel
156s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 21:23
Static task
static1
Behavioral task
behavioral1
Sample
3d4d569748e418af8fd547a4f2035216.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d4d569748e418af8fd547a4f2035216.html
Resource
win10v2004-20231215-en
General
-
Target
3d4d569748e418af8fd547a4f2035216.html
-
Size
2KB
-
MD5
3d4d569748e418af8fd547a4f2035216
-
SHA1
a05e51097dfa568b2c46db69e0781eb8d3393800
-
SHA256
2bc92e69fff482ff18fb1fb1e432a5bc10ce71c7a0f283719beaf6cd576fc241
-
SHA512
7a25fec73d88c7d5d9e61729bb68104ef4a939c34c3dc23e53513d1df80350c46c21ce68ce002323d7a410b0d713768f0740116a5f81597b49d5e952b023f2c7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000847345809774c58820866d1b20e7847ee4c5dfd07d1f9055343626250028eb3e000000000e8000000002000020000000df3e69bc15d75cb21ffbbde96e85350370cc06adfaa018ec2a62b63fb32d2d2d200000008e70f645c1c72276361ddc6227861901fcb5e265fb7f8875bc7540d2c09973b54000000063b33991acc59e82f4aa4f85b8416e7c55a48b09470bf33c9cc2efd4a1a2a025da2b4d62d6e988107392ca3cea983c5d77078e0a8087ba379fc2e7734fbabef1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FA8FAD1-A651-11EE-B5A2-D6882E0F4692} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07d89645e3ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410019855" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2732 1900 iexplore.exe 28 PID 1900 wrote to memory of 2732 1900 iexplore.exe 28 PID 1900 wrote to memory of 2732 1900 iexplore.exe 28 PID 1900 wrote to memory of 2732 1900 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d4d569748e418af8fd547a4f2035216.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5880154f2880a543f880810b193b1356d
SHA1149fe272b37e09d9871c755fd78a8ada0e1485df
SHA256fe99f9b3566c96606ac4681639d4f08673ec3621de6ac77bd1656f123c5a3673
SHA51228b24a0e28660fd2bc1ee7099404c68dfe71898c52fa83365268edadfa94b7648927b0e34ffa65aa05a75fbfabcbca3b8f796470c1354864ac3af92d8a92588a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53857ef7cf2d03687b919da93a2ee512e
SHA1a1b8a71671de7630c1a4540262a861000019ce88
SHA25678d65e12ce40c6ec2262fef9f528d69aec80c7998c6f44b2a89db19a715fbee2
SHA51250b92692e0b74f259b92bcf5f2672d8b670c09c366394d70e40f86b6559ee67987d78a39f20c2c3508e9aa4666c3d6598c32325cb5fbc0de02ef1480b3330e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4d75788e80979f24fad519aa9f800b5
SHA15bfea239e3341b9906779fc0c1d2cb462a3ead71
SHA2560440209caa05246286a03a3054e7e62ea1828041da31bcc07ce583e6fc774213
SHA512328ffa7d4a0e859c23be8eada583c028cf951d6757949a36b55c3ba38aca216df6c597d8e86b277239478c16e581470c202177c20b99e8d767ff92228317f8ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb5740d0191f113ae6598562f2e0141f
SHA1f6f0289bfd2e69348b37a0d53dd85a19fbd5b3cf
SHA25644d10feb179cb9166180dd8f8a162d7ac5bfc7658f2d493450787e22cdfdc910
SHA5128a82f7613bc6249bcc69bf186c583a8eb16c6e09c075b6f7758db07e363220ae8ce3e0337e4c0c7793f13d12c2c8ea697e52c4906742a5802a9da72104e9d18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9b9411d145888a7a6fad57ce203af73
SHA1303ce7563485b876f59d46e71a3c14ac18ee71aa
SHA256fe154a79d8ac6c05d0007333cfa2bcdcfff56cf65b9f5b9b3189ec6f399891be
SHA512fbe5fd640b85918cecc05445fe22cfbcc5ab9ee9f9a6740e9f09660aed884477e74fe3c06d241580bd2ec7ff990f99ff4308e1d84bb0bd681beb58fc94a8788c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc56dbc596b08001f2db286ce1236749
SHA1ca0ff7ceb6c3391c975c8d78d5d41aaa22ebc137
SHA2567050b21f82c989d30750d35cc5bf7cf71d2a8a80331f671a1e7cbd6149e42922
SHA5123d57cabfda23b0d9d7941efc99af3c506c9f08abfc8367ce0687e2e1c5cc2fb9872511457ae6e3ba85ec1e04239d7455ae4abe15c85e533ae33c910d9688e600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cd84f1d9a4c74df0078fdcfa50a59ef
SHA1899c89f9ba40026a2de75708792d474165f48316
SHA2569146bb0187ec7d6d8f0ec0f4c8cb066c0983e1ad0544f7112c562585313c24f7
SHA51215ff062ef2ed8092defaabf9e192763f560e96d2060cbf6e087026ed71344c9f190a11c910874821074b6af688cd9014d35a50f3a88058c83e388ec8bcd7c541
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06