Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
488fd1d9dda60f932db96d3a19c5de25.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
488fd1d9dda60f932db96d3a19c5de25.html
Resource
win10v2004-20231215-en
General
-
Target
488fd1d9dda60f932db96d3a19c5de25.html
-
Size
69KB
-
MD5
488fd1d9dda60f932db96d3a19c5de25
-
SHA1
0fea6df0c7ddac7c8b0b1a83024deb918db1d9e4
-
SHA256
e2d1eaac1577196ea9c1f33ac19d41a20c029a8c4e50ba0d86f7537cd191f716
-
SHA512
2d1dd5d1c03d00214432fa3d9e671b00bf8a2061460ba463d773c126fcd560c3ac32063f8824108d153f5824e42bf057a8807a61917f71ed1ddc46f4bed6bed5
-
SSDEEP
1536:gQZBCCOd30IxCADlkIC8TaKvoheg3k6kUBTwEpc7Xx7EzgWvvgosdDBgU2L7tdGu:gk2J0IxNkIC8TNvoEg3kXUBTwEpc7Xxu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2204A611-A94D-11EE-851B-E6629DF8543F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000df756639b11d62f050da8c47df1dde9986ede0aa3a43379cca6cab4c41dd1dec000000000e800000000200002000000058100f2f137e573c704a3db91b354d9a9757800442680bf245a72cad7a371f4a90000000ed65ac3b724bc560c2e789ee5b8da30c3cbc7081b138edcca693462bea56c231e68f2bc9aed3d0c8a90083d21c08f5d3c6b923d8140015bba2620c1d9f7b89b931c8601314fadcda946ebe45a1f594dcbf01786c8197d3bd76a7ea0317938023bcb4bc0b5b91638c170f0cd124ac2737396a47eb70866aba5aad748c39d2f7e6c78a7ee296f850ee24561b5b134ff1aa40000000b9d6b9a73f1042796adf551f406866c53d75205ee4f26273ccdb90b91849de217e129d3395f76e1295a792d710b3516541cbaf9579721014a106563c727c7950 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a0000000002000000000010660000000100002000000075781185287000024f93d3200044e6901eaf6fb4eaa342a90bc675ace34701ed000000000e80000000020000200000008186be0beddb4b24913be82eb0f8e3be33ef9846b8d68abafe887284b46cb1d7200000000488c031ece76dc21365bd0d8670a82a8bbe381fb9a294384492b7dc95524d4440000000cc2a7fc1a9573b1e572ddf3d4a173109f9d2913e08e8c283d09a24811ff992105bbf13840a5aef5bb9e1a543c800f3137b5cab95b483b1c37ecfeea4ed8b1c1c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b303105a3dda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410347794" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2264 2108 iexplore.exe 28 PID 2108 wrote to memory of 2264 2108 iexplore.exe 28 PID 2108 wrote to memory of 2264 2108 iexplore.exe 28 PID 2108 wrote to memory of 2264 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\488fd1d9dda60f932db96d3a19c5de25.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ff91cc0866cfa3ef6738fc4cf6062d1
SHA158e15e131cb9b99714c650b2a09c2d3bbf80b458
SHA2568c0a2d345fc33f6be3133e264848125933bf6ccfc8abf511f85881b4d1bf8216
SHA51214ff89e5cbe5204002faeebb0df3b6ad6accdf1897ac46339df720052bd86eb1f66e9203274c7bbc6d84af8d857eda7ffb5e4ac4fc12530ea7d130bc19d111fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d389662f7ac42808a1f02c0675f291a
SHA1cd0b87a80b00b86cfe1313f6efb63b27cf6e111f
SHA256d567a74fdc6f2003adf3d9c8be6b17598d9e8ea33b1bbb4d0e93cc979a3ff0ee
SHA512dbd3fdbf90b42700cf3f3262cbe2d989f2d92ebc4bd9ba7afbedf65c0ebf80efa6a4dea7c8f5ebb14fac9aa11f3539ff5d60dc17bad654f2da6cd1a8cadac36b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc01374ebc96b7172a2a07b357dfd34d
SHA17556381fbe55253a144cccb057ea7fbd9642345c
SHA256822bb220d108f6ad3045ab4319023074a5f76f37575a6bc611ee4d9d56abbb0c
SHA5128c57264ceff4fb184bf55f517000def05a908a00870dbef6a11415b5bb73af16341651b0b0bb45566970ea3b3b09d60d7ffe9599308b3496c77b94468451a85a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5619c7aca0706a4f6ecbf474a06cee685
SHA1f6dae4c7ee377d4372e66b9f6c7d4bcbf0653825
SHA256e93fbf7da24ff78b251a59394a3595cb15ce90ee2ec08647a28f93dd4cd16995
SHA512389ae4564090dc2b59c39fd1ed2592f81ba3f8aa8f39af3bfb6bf45a470cb677f586e8e42a7a2b6d7c3ac5d4562b8ac6264adc28dd8736b513b330e10a815808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59678ecede26e832ca66b6f1edf45a35f
SHA164553ad8d8ad4f4a852e2c873fec007719540287
SHA256a28d158120c1c949e8cc4029ee55e716a5fce7e29d4e33588a077ba5c4fedf67
SHA512a135d639d67737124ca19b285fadbf015af6b480141bf6470530e64d40987aeab3a06265dbe07715b134aa42c9655a1baf45a0d6da48c679f46f54dda1184496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4624652cdc8936608168e8d74b0d85a
SHA129fec4344704afd6afadbf4cf23184c637c223d2
SHA25680d373f7b5d3f9f052d13164a9fc4078f9bbe18eaa7079a75955e839c105a08f
SHA5129ef868ac05688007693a594c4a0c762a9a8a056c6ab04a326470cc376b9dbd354ac206fdc95fa80875f84ddd31bbc69adc177a6cd5e9ffbb8859c09c28e6bb21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598e0083b905ec56921a231fc243b7576
SHA173417251bdce2dee5646e196bf8ece72012d0d3f
SHA25612bdd259d52f1d678afb90cf7aa91e3ae6e39589f84e2dcb9bfafff471b04b6f
SHA512708fdd8755121b310610e3d36540379addced9c872e97f56d0afc65a8bc8762367944e408b3c656fd7daeadb51a132edc6917fa39244da24512503e2276fb511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5861eb884dd9ccf31b8a82b7d17164dac
SHA1c72cb44dba8b00c992b4432e073dc11070ce28b8
SHA2563d3fe33c62b96cd96bc0465b285c334a16b4b49b204c34748447462cda2692d6
SHA512a008c30314ff4c658f2118bc5324ecd7edd942ff68d69edac723c490d961325b07322f891c3246bbc986ebd66fdcca6e50fbec7c8caf222bfad08ddeecfdc2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f16fdeff23345a74d8d0c577d4faec41
SHA194aaa48c9c3cda344f2fe7ba5bc36d7f2c7c7ac2
SHA25626cc7d0e2d40cafb1243697b7943b1067e350c0f6509468bd01e7e0e51542705
SHA51271cd3679e0f95f300adff6d8a70dc70bc87c4a4302df412f416adfe20a202a0a85eb619674bf9d878dd0e171248edd0a0e53982d9fb3ebf6a30ba3a924dc8c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538c34c8dbdb4db4d8df071c95b3928c9
SHA19505cbde9050227d202bf06c119b289978d35d3f
SHA2560a95d3b0b7248cf6213421c391a78a54a5492935ed5264de3074b7152f901d52
SHA512d7f69dbbc0b6daafe14a904590eee0d5d357c2a71d8952f1100fab3d6eb6c84ec8bbd80757b1c1099a2749819eaa5e2d059b7e5dedf576ee3d73cc32361906ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a0f79a0377aea7f784207f9ed747c12
SHA1681335677f14d27c750dfef9d12cce4cdca727d7
SHA256beddbc681fa3dd469f09441b583bfbdccd98dc54e216f835c3e1b24640cd1a26
SHA5120adf211e84a48f05c617eee438b68ee7d930cdefdbdcd7be041d60ab817c46fd759b16737272c548e00f05548abeead2ec9f2d7cda9d9168004d42887df51d3f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06