Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
47a96e3b10b2ba13820310eb1999f559.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
47a96e3b10b2ba13820310eb1999f559.html
Resource
win10v2004-20231215-en
General
-
Target
47a96e3b10b2ba13820310eb1999f559.html
-
Size
30KB
-
MD5
47a96e3b10b2ba13820310eb1999f559
-
SHA1
209051d1dd59482c10e543dfc8199838ebc97228
-
SHA256
e49064b59de92f7ed543a6d1ff7091544e5eac8787a51b9a78a3626116edefa4
-
SHA512
c490f0b681226031b16612a7ecad10997a6fd22132caea3301ba25d9372e60939063c2e787b0b4d04c569d4c612f0e5074be4fb14391b843705dc54bd69feb1f
-
SSDEEP
384:p+7fp/evn1HkvuI6eD0nD6eMj7xTIA5/5N:pcp/ev+Z0A5/5N
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73B705A1-A945-11EE-A68A-46FC6C3D459E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000cd2d9820e5b1a30e181e6d6e63bfb55e4700ce3174fde925bb83f70d3e6a8f15000000000e800000000200002000000086ad3d5bbc2db0f08053ec21bf1fd4e238353f2fecec1bac8ccc1e137e17c0a320000000a244f82342cbf401e4bd494cc92c6e661837844afe5a71ab3c45b0eb431328a0400000009f6e44e3d2e52a991737e425af50111238dedbea3f37a43226b75cb7e54486df84a956ec803cb0f2c58696a946173d46316c0f975b64d18f6167e84e69903d46 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0cf244a523dda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410344508" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3048 2372 iexplore.exe 28 PID 2372 wrote to memory of 3048 2372 iexplore.exe 28 PID 2372 wrote to memory of 3048 2372 iexplore.exe 28 PID 2372 wrote to memory of 3048 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\47a96e3b10b2ba13820310eb1999f559.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5fcc06983611928caf7e217b0d0380a6f
SHA1013740e606c113602b4aba4c9a8acc8a665c299a
SHA256924b2dcd59877b80712394632064dc6f0aede9e170b1838168a642294e4ca15c
SHA512b1ca225c0cbb0cc6e47c9f2a56c3dbb7a8a2a7e1dc1fc1b5ca8614fa32500bcdb954564067c050fe51de11b961810f3b7ea26cf7b83a43d554b43ebc65c997bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50d8f5c046f9e7111fc63621377fdbf93
SHA12e30a23d51b5671a73db697f375f8d177039a5e0
SHA2563dacbf721ea9fad19755e0eedbe104029a19ff0c5a0b37c139360fc99cc9f85a
SHA512cb393b259ad0786b80300c04ae0dca9152d62a74563756c1ea039b24a646507f97523c66833902f54eccb89285ecc3b18595e74d119fd7559813c09c93abb9a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd15c985f222911441a0840b6fc7aab2
SHA128fb01a638a1d6e5ed121f715136d698cbbce94c
SHA256118c7b6690801ed966078dfe783beb2a1226cdb72735577f2883d7fa72368090
SHA512f169f6b1e4289b89ee7ebdf8c1e95af13a8100e47358dd023bf299523ef7e29cab361331200c959e545acb6b996d6d8824af886a1115c20b8f24dc59a0af471f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5930d1b3c9d63d85d746a1552bd3894c7
SHA156d1de30145b4ac1ed1b88e09a4adda819cd6d88
SHA25651e1f8766d0bbb99d03d5c6bc74a7179be464c74492738750f20abcb1281eb5c
SHA5121f3dcdda4340d8a4b632a60a2130b7e66532e4b1ab08cb628a1751a7bdffbcaa5391e7ba4b287ab6a7ac993b78222cc9cc2ec3c74d7f26034be57acece36b911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5181db7da72b372fddac0a92eb87d46ab
SHA191fc6008e27e73553bd27fdbfd20e09fb1d70ccc
SHA256f8dc0b972f4d3695c212ed56908bca46751feafafd3ed8a84310996dc33d1c04
SHA512ac392ec5d411c350fc700c49a87bdac6ee3ef2c0e4ad8e30d27224114df60ae840465ffaff1f71add6b4774ed0b8b33edcdf2f4d1e4ee45e7be8560f2d5eb6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba89590086a8033d030d78e60518e2cf
SHA10cc333349b5f120b5fd6ecd48064fbad6ad1b0e3
SHA256793313b36f9d5e691688af9bb16c8addf6e0e1563a4f91d6390531643284b657
SHA512539109dc58728aa667177008085786b29848d3f3a87a1f3428ae52474bc185b599d2ef09eb684ee63ad0477153bcfd7ea897a1824e4e316bf4d233502c1b12ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aae269b4ce9185020343e00812f09b5f
SHA11862975193bf5666e23ba40fa5978e018628c6ae
SHA256829fd518d6f681081c5527ae22af3cfd1221b9868f1592914502f14ae90f6021
SHA512e9d129895570b7ba8a0123ce03a10c6506bb8159a7690c8f8c52beca0f5a753c5589035df47c24dbd716305f6e231b2cda9565a44c9bba5823f2ab37ae5c42ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c530b8082b2aa074fa59d269d9cb86c
SHA176ada3eec155891081d8f0663b701a6ee00907e7
SHA256ae4ae07bd5e6ec4a18540f2df679c1efa63e671bc5f07030652747e7421cec58
SHA5122137f46ba5dfcdc116276fbffdd026e662fde17a634f0a5ac5b353aa1731c1067445520fdc198350e74c9136f2553a2f0f06451f7e78c49adccb646ceea38f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5465859d12f2e132bddf2e83fd0e2635f
SHA1f7fe9136ab4c436e814f0cd502ca68d84fff8648
SHA256801f041e1d2257598628899b812f7a6135a64556925500e00d3d3115cc635b9f
SHA512c04fcc5a175f9900090b1fc92f414277f649ad8c40a6e503456ed58f49aaea3d6742a6cf9778a6944bf28a82d041aeaeca6f6b66e44bac02a0c336fd4f32409b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c96c44816778fd839358f7e53ee6cc9f
SHA13cad1dbc0321fd2ceb08121e3c3eb8c9b1d73290
SHA256ec979d11f8435deee6aa8269b21c761aa4f55070ccbf759bca8bb5f85cf4af13
SHA5129504dcd0ce1c60a2b41b61b3dd57c70fe9955a09af980505a5b99232efc3c993176a1b4555cfd91f5c4e6d685c5c1e1f67c46e58ab9a2c071412339c02bb5ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06