Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
47863a8bb8c461af91cfc7f9a403cb42.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47863a8bb8c461af91cfc7f9a403cb42.html
Resource
win10v2004-20231222-en
General
-
Target
47863a8bb8c461af91cfc7f9a403cb42.html
-
Size
48KB
-
MD5
47863a8bb8c461af91cfc7f9a403cb42
-
SHA1
0adda9f9b54459083293940e3f354f131aeb69b9
-
SHA256
140c4a5aae2030f42b7fcb263ce22459838ccc9ae20e5ef587a9d944711fd592
-
SHA512
af88d5afad92e0ed568db9dcc5484da6dfce25138a776988cf4540f59194bc2ee5a665f0a8350f2ffbd8108d8df6c2c9b43f24e2fb4ba87c6e7c6d0b6365e578
-
SSDEEP
384:dqFCZZ1DzCWo8zO1iAdFI0nD+VdE3zuaxsJAIcwDPPosoWcxnr6h8SahUYcwQS0S:dqF211V/gyToD4nhxHK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F0811D1-A45B-11EE-B3A3-EEC5CD00071E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e095b06b6838da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000001c26671438dd957be6ed5a4df49aeb9c428b3270a8be7273555e96bbfb2e8d6d000000000e8000000002000020000000da357694ddd7f2f30c130147e45c8d5361becbbacf155bb0e13fb01746d9d3cf20000000d84b495540d189a5d137b8d6a5ba35b72521b4bcd5d2a2a8dd42f22e26b901a54000000012a3dd209a796691939369a06b65c50bd3e59d5e0adc6b484efb6725627a6bab4a0ca657bb19e4ccf9a3528c756a85f311847475b445286147b2bb665065046b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409804236" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1064 iexplore.exe 1064 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2780 1064 iexplore.exe 28 PID 1064 wrote to memory of 2780 1064 iexplore.exe 28 PID 1064 wrote to memory of 2780 1064 iexplore.exe 28 PID 1064 wrote to memory of 2780 1064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\47863a8bb8c461af91cfc7f9a403cb42.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a595c953cc96babacc3eb138395f4cd8
SHA10a20e91dd64d9cc0ba582a6f21226e72ec9475b2
SHA2560bca91793b1909d5e92a7e2b28f87529b3841e9611c5d129fcfd98ab8a872b7e
SHA512e9b9fcf0e5fe4f5474e006f16068d6a073abfe676c9797513df90b9b7751c974635bb9086f5e76e42bf62744f43f7b7898214a6d270998b0587aa9b4e851b2fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4878765658ba32551abd9d80768fa4a
SHA1ee18f3ba70d4abe18202f0dee1329c6223357b01
SHA256a5b98a7a364c7f328e43a1def489a9b5eee2479f76c5f2544539574ba24b4aa3
SHA51277ff3a2fc5ae4f20f2aeeed3ab1d0fbfeef0040b3fffe851b91f2f8fa17c1f2f54d8e760171bc5068f00f6b367252bd5f6860daba9d76dab86fa1f8eff12f10e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b63aa07cb0a4df8bdc3ded03393c0fb
SHA14dcdfb121c4f65f62c61dd81ba94bb81b0ba274c
SHA256e99b1e93898e487248b60b5f769b2365968d8c5702bf3cf63505670126b0734b
SHA51288af7ac2028f8a3a2699a4b3f9c749b05031f33ff74a6d7c8f32cdeabbc7fa926770129c43e172f024f98228d9dc8c113c34db89b10793b319e8468a4f6279c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1a95bba694e271b8bba364369b59803
SHA1906bb3579a475d032aefa26f94c1fc149990d440
SHA256b8cdb8adc24b1f190c5b3bee1e7572477357a9cfa918a55937fbd267a5c97352
SHA5123ae349ef34caee307a16df4039615642e558a0eb21579db566ee04fdc44305513e749405813b5ac01b4905ee4ed8afb999d4a756377b005680ef9f0cb8c9a9af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7b3b8f60a413d397977334277908c2e
SHA1c2321d8c213f95a82aac73191c57e3854463e5da
SHA2561269b5dd74f57a7fc1f85309ca338fade446f846e9bf772aea5f7ffd0833fb8d
SHA51225526bfb532d7f8de467a981a90e07622624313a2144cb55d8808ab29fc8db0eb659174bc6663f3f05d37561b348f2c742ab7d9e53fab633cd83310d9cebaa27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b13f2bce96a14dded4b269945c919a45
SHA1ee8783d013fceacb0de5597f0c037e16ecccd32e
SHA25645d92f8de9793b8448234e040948c7667d792692ecf298efa5047d40a894cb7f
SHA512029baed731a8cf90726720e869a1e4b7377e54ec8db1b49ea9ff937d642c4f86954415456288d525fdd3b5f60558c84757b4b86b7ce2612e7cf547afb7564731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a23ec66cc9063f7e7443d0397652296
SHA125f96c8e9a60c6694d9d69ca2adbf73944f1b2ca
SHA2564df0b060f5b7d4bceb56f8c21ddc669a69bed7bb2905f12d444d132c0e7c2996
SHA512b267c8db7ad6e630092759b507071b46db1d71ab00a00d7eaba14c8a99bb140cc8673ffd32ca0888d133f935ccbba67d8b4ae57c5bb6c1eed58b2b2d133aaab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572eb63d6307bfe5b0b1cf5f19748ab06
SHA193140feeb78d19c3ef901598217ebedcc1172be8
SHA2565fb7e031f37f16850e0f1c51f27d313ed0811f29443865cdb3794569cfc110af
SHA51269b6459dd3beb5e9c0d0a00b0876baaecbdb74fb193b942492fe399245f3fa867f480a6cd18c149720ba60c9ba2030ea11881335d38beb4e9784927f32850a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58deb3ee8e52bfd1933909122298cf34c
SHA1ed07503f5adc5412940222a47d5cd1c9465e9bcb
SHA256cafac173d5c749727c700d0def3cb194984abe2bc731a8b8c36858315a186f37
SHA51263ca62a3e654f88a4e2e2d598e17472a0b743c5d0b384f94e351b4612340868f2ae4b92a9129a3b5ddf6aa4402a04f02b56ecd51e1ff4a58eefd8e88d9887e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aeaf41991f06c913d9623c2d704f38a
SHA15ba15bebdc81c05b0f961a2e429054e21f33bbf5
SHA25658766abe1413e51f3ad3d82e2100788cbe072c5f36c55bb6a3ed7240b35b6917
SHA51221f84af8d74e50f66cec2071e3296cbdd23a8d90bd12b9eab0ac904434b1274f60350a04d2b8d674b1b89e9995e6a2f9cc0351ce25ca12b8adf6ce3fd5b3daba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511a5de6e7cf73c424d5918f8fe8423d4
SHA187fa10cef7ee61058156ea57b5233f079c0253a4
SHA25623716f03584f761e3bf9c457930ee706ef6b5f929089f2911416436e8e6492ac
SHA51272d10612f985364b53bd99b29a6737046751b0d1bb168b6f247c170402757fef9abd388417935fe953ae1d82d3ae638ebf683ffb6c1a56104b735dea751ab8a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f760835b52359d322313916f7cf2f10
SHA11b5c83d3042b7b9c4b1f9c1fa8d6b23dca4f6734
SHA2569e88acc1631e63283429db940c9a69a0e751b83f8bcec124ed6009ac93c408a1
SHA512a1d10be983ef4c7365b85f834a93f9644d801142c42d5a404dc0df4b5bf403c2056584d0895d08a0927ba11224c31da4c12895d482d1fb80072ab143b6e443db
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06