Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 00:11
Static task
static1
Behavioral task
behavioral1
Sample
457020241dcbf5ba07d97a5ced19166b.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
457020241dcbf5ba07d97a5ced19166b.html
Resource
win10v2004-20231215-en
General
-
Target
457020241dcbf5ba07d97a5ced19166b.html
-
Size
59KB
-
MD5
457020241dcbf5ba07d97a5ced19166b
-
SHA1
2ba0aaa88f82465807d3ced922746dc2db6ff540
-
SHA256
1a5edd6b16bc356258aa0a594f155a94008097bac8d82ecb7d0ef780d2f77288
-
SHA512
3e70c3097dd07503ec36d3b72e2909503acb4f9094319a61f9ffc718d59151a91d92aad971240ba028cf5104f43a339bf574e30e8932bfcce178d56d33c57c0c
-
SSDEEP
768:/1LAi1S5y5vipU6IHSO29ms38qJF351r4vHCVPO/dlFDr0BO:/1Lpg81ipU6MexJF3DMvHKPO/dl+O
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409800560" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000002f1d6f0de5a117318a615f092d3c91913e2103c0536ffbb90607197b9fe8fe37000000000e800000000200002000000073d34958697c8de2cd511d36eb3520e699d0a7a3b0dace6f90cbef47c9d2b1cf20000000d64add4f4236ac0a470fb7a6e81044a97d6ad75f7dbbdfad3a1ffd10b182dae440000000b5175dfd7b4187e06d14c63dfb52fa45078e1ca68305a067b841240e562bbae62042a502717cd7b9e1af07554e5b2c6dd572740fab64ce816fd5116212fbce82 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FEBEC9F1-A452-11EE-9843-4AE60EE50717} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30770ee55f38da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2312 2404 iexplore.exe 28 PID 2404 wrote to memory of 2312 2404 iexplore.exe 28 PID 2404 wrote to memory of 2312 2404 iexplore.exe 28 PID 2404 wrote to memory of 2312 2404 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\457020241dcbf5ba07d97a5ced19166b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5700218cb83cbf9fafda92b29f06b661c
SHA13e7c58a54aea6ca36ab392ba20b838925c5f5d43
SHA256c3a4af835391a875d6150a5c01461dab0e18853bbf59d6ad44b3cba65aa293e6
SHA5122a7f56ed5b0c2f27e91854147a3d0fce1e33fb7b39dcd864603840950f5b7594972f9840db9533d26fcc941ad2da93d67b00a8e0f6fb9fc59061b3b1924e638b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD51b561b23ee9ceeeaf4529329f5b51d9b
SHA1680f35a29ade9a2583915eb0a9b3bfc9d61621d8
SHA256be64ff9e6865df526634b323b87f6f7bdf4aad67a234d9bdea0a5c558f8eab0f
SHA5129752892fbeea531281b58b6d548d331f5cf92f93cbff829a7702b82311746a5d4588db644ff203f99afa5ac7e0dc546e3224d28ed733c3cd0b668fd90203d98a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56294e47c78682287ea8140faef143547
SHA18a83e6061cb2b5256dc28c452663f552cbe1f848
SHA256f1db8273a5239229fe8effcde3e23dcc6db232b3166fa8836963bb995a2f6117
SHA51299409bae344bd034465687bed683f1370e723055c3005559cb1554b6b2ee833e63f59db92b064228bf56fd1481e5aafd2c5a2f38723e2f5a4323f25ea51065c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fcefeae550e95c7b72dc8e18151e777
SHA1ae8a03e041ffcf8cc4d4642ff06cc58bf9309d3a
SHA25679e70cd83369b6107b3b1c255306e5ef643d631c846a191f82e63557062b93ec
SHA5128009fd4931978a6ec803d0dfb5c72e0f1951144a64af007fbf204296d9d633e32285b60b691e379d2bdc6b3446b7ee11492f02cdb8e9c3bb76ad956cf39f5fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0bf368935995a0219d7b0fb4b3dae29
SHA1c58c14909aadb2a4a265db16e1d625515e27ba13
SHA256bbf4ce9f60d8f41860dab7063a3aff1fe90143ce9067c59ea6c1b52ec7d96238
SHA5123d5ae48bab4118c79afd04c037a5b785e4ff60c017dbfe2de6c922438e5e73a8da1c374c55e50af689386601b12095521a58017c52bad827e473bb63d6946889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544b512e5746ac792f6ba291b97e9d6dc
SHA17a1bbafb1ba6122ebfa04c1041625ce2cef0e6e2
SHA25680b20223b7d1e4713ffb0390d3631442abae73cb8cb511ff6ebf85182548d0da
SHA512d7b074633ee13efd18467371b6e5ef675b280dceb41be2cf74bf48d5ec13c78a43b1876fd1c84e5ba9104f1beba8f159383ebdf2c05091099be64ed83f57c64f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dbb642f4862551f8b11f28f16f7acae
SHA1d8dd339a3f94d8dd69050b001c6ced2af2c85c57
SHA256746830ae91e16e77ef61d70fb48da0f95d81fa476104ca0443c95afbc281989f
SHA51269f88eb5561dcd020b15df13d91dcec00a5faa327fca9f4e41091905495e985dde9bfc247347db54b3aaae37c14c51199a404f27a09d3daf9d20b831ae876d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506e1ec7e231fa5e624c2e81bc2495fb1
SHA1e08250c52888ded82bf22f98103fcea0323dd687
SHA25662b559f6cbebbc2f5691bfc216049e670abf5316d1a5ca69d06ac19803557474
SHA5129cc0b8e7b4e74df77661264a2a607d1d2a54a13c618c9082c3d8df8e12cc9417e63661eb5490cc67aee0a60a0dafb11c99ea0295ddc5ca93858d2989f9048d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad08fa1bf5235df6b63ce7dfaedde438
SHA1004bef74b99485607bb4afe26f5468d4043c11a1
SHA2562b52e8655ecbce5324c4893727364b6637cbffbcbe7561b431d76353ccf8ae92
SHA5121fd3e24d6960fc0a2480034860e27b665aa9d0a0dd8e9dff843e2ce2e7d7b9491785794362d773d16de6584cc4279da13df7210b397b94cc13406a2969885ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d7dfa81c2bc1dd51b8198565b3e7ea1
SHA18211990bc3119b3a8d73b8d47077b8cd944a090a
SHA2560f5d2b58c231f79ca6299ccbac156a883b9c0208c171a27a79ca5c79cdcefb41
SHA51255ecc2e06f01f0f8bf95ec7cee194a586c2f3d34b0d1193402817ec5460632afcb2ee04cca0e586ebb8e87a7da928b01bf8ccfeb3b09ddd1ecc5d8a225e978e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529d7a93d093bfc7a6f084df359280a6f
SHA18d77a4b64e06c191a3dba3eb0e9f12b20d672ffb
SHA256542cc8fe01be47892ee9a91c19f1ab363fdc01ec0ff8d5e898333ac9e92d8a39
SHA512358f3d02fc937f3e40f14d355f706ee5a78c0c4f4d5d155186eb09c89645ea51d4f0cdc2343bb1be3aa1f3a08f433ae979402fd35a978f7a031b96c2dbe34bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59822e815f13e191cbca1826c846fd3ba
SHA1f7f8c4d6034b9f26556dd1805896d449d979f493
SHA256a8cb8d41c06431ef93c6c229a4358dc7a472a4cde8eb18094a5c8400bf2a0e74
SHA5123e3503150773fbcd3968baaa1179910d616d4e50d8e532946aa583b8a4a8244a4b3e562022c47c4c803790167be60fb7ee628785394e4dfdefcd662a29d3976c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2ef9005d09ceb45fefabd02793bfb8c
SHA1eb36c0f87fa2d0e19017f53904278e2425b5d033
SHA256c8e531f7e28c897f2758dfdd368e04baa2de7840c92c562516d88a64aaba38d9
SHA5124a26bda8087a925b202ce10981c25071b440cb7983d4577293afd2ffcab44bf7a4a0ef21491c62d9a59c5e4727f20aa896f7234a086388e755c06349d146d5df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad0abaa1556d777051d11a8234d155a5
SHA1009d3d13b3d1676fb9136fce523063ad4a74b9ee
SHA256dc2097cb38fc78db2d1db7e0b67be99071c11f431287f5bde3187559d15c13d5
SHA512c76636064f5b25ac6b616fe83907354baacdefda91a21faac4697f505303028273144f645f021f0d2db5740e567d632ec696e1ace5dcdc634d7b8e2abef9eb98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD533b77ad9714bb1a514047fcd0aaeca45
SHA12a314a48e0d50dac65afcafb76dd24cad1efc2e9
SHA2562390512d478c771cf2cd5c0c81918f07a5fe87667901571c6fa921f1bf79b3d1
SHA5121bd73accec93f1345248104a761c303c9a2bbba5adda54e88c6303aa081c76ab9f1a21afab836d99fc151ebb0533988803d92261281cc430ee7e8c41027cb965
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D0I6KXNQ\cb=gapi[1].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06