Analysis
-
max time kernel
118s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
493b19c521279cab02175f9de2c3002e.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
493b19c521279cab02175f9de2c3002e.html
Resource
win10v2004-20231215-en
General
-
Target
493b19c521279cab02175f9de2c3002e.html
-
Size
60KB
-
MD5
493b19c521279cab02175f9de2c3002e
-
SHA1
7c0bbc7a2dbe80e6e8cfddcfee5a042a18adea91
-
SHA256
c0710fe0cd15eb7059e801d8d16632e906b7d2b1e520ab4b4593dbadd963f0c6
-
SHA512
9a7329423371eaf3afbf0cbcb8c0ab3887456e904b1502fcac91bbc3fab4485aaf88445acf1a219305dec972ae28169b62090ff1b611dba15237245f1cb1f0d4
-
SSDEEP
768:GZJoagGJhmq2jANHdE1kyxHgArN6s1N2SGtWu:i/jhmq2jAnEyWgAh6s1K
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 201d6eef6e38da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000fe05453668c6766e6505a7a2fd7e7f439765f61541d7d9ff680b9cb02bac877f000000000e800000000200002000000048c5050409fcf99cf18806e1b85e5b0bfefdecadb6c92a364e87f805c6a78690200000002a850bb1df871c4fea321080ddf3d50fd9d84f3aab2e5df7cc7da2ac416ddeae40000000a7930df7ffd7926f94efb00e03e1305a588aefc47de08fbee29027b938b17d9cdb3bdc3f343d657b6c6139b885248759dec99ea4e60737b294c8692241243949 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409807042" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{176FC031-A462-11EE-ACBB-46FAA8558A22} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2012 1732 iexplore.exe 28 PID 1732 wrote to memory of 2012 1732 iexplore.exe 28 PID 1732 wrote to memory of 2012 1732 iexplore.exe 28 PID 1732 wrote to memory of 2012 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\493b19c521279cab02175f9de2c3002e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54857ccc26e097a62921df9f835111fe0
SHA1443eb7c8856d96580e0d572e39e09f3e97c16f7c
SHA25640475c9dbf13bb35a849740693645c5701c643f7d675e6da16aa397bd4300545
SHA5122a17c2c1141a6c43638fa65b149466ec9bd57ceea3404a9c5000e50d60f2a94497d3b3c5026f0daed6d68a2948c79bac218d21b89d0be2806307e14bb80e2255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df8f693662e444f0eed4d59e7e110967
SHA12d0450e8166a917df70aa001c26d57420cb7cf6b
SHA256a9c3fa5047f228381b22d36965bc9db1d567c0dc117d705ad57e28ab8ccecaca
SHA51223cbc559a411e3007443cbd4c0543aca4cdae4155e3514aec4baf678c68f14971b7b124531780a6d71164d9ab2d128446b2ffdf88a3d59d017b9f19949d1d91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8ff6088170862e6cb90cc67cf0392d9
SHA1a60d293109385b5f415b61cbe5ec48df2a600620
SHA256ea1f355a9851792d793c7d697e3459aeb80dff72829e448d7d621639607ff50b
SHA51213c47280c6ade6d595fb0ad34d742e06ef24a3594c9f08fb903e823382f9047678fe9f9db9dc74f250907c2a62a68be0057f4323ec109e4729d8d7be6504bd42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d186089b74c40ca7fb3f3e6c2d6a76d1
SHA1fa72b64842156c2edd2b475629bdee8dff6c2ed0
SHA2569a32befabd93ad9fff926f712737c22f862ee04f31570f1bcef25e57c168f321
SHA512958a88b543019709b6b62aee3f6680c3ffb9c39d046d2ca587a069da185556f19c3f8ca985ada72e5600668aa45d3cbc48f839ada3cbfa101f5ba8aecf39620a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a501f76852046e5672e022610412a57
SHA156bac46c9bbc1b83c8a4a1990f354756e280a897
SHA256c5b5031281bbaf54b6d1462fdc739f12022d30350f5710826cb7b1721b0e3b81
SHA512609b55021dfbc0adba46939be344a5b4858aa8b2cfd11eec6e9b17347a17ea0e12acc0d5c791ee4f93ff8d343dd489236ab91340e21f5660a9e8d18174d3110d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc6ddbcef7c28c2d43104c79377345a7
SHA1554b52e231a07e19f0e479129b52777c6ba4746c
SHA2567fc64c5a0c7e217f4b07b21a1cd3967be12d71b4a09f264138858bf38c87e0ca
SHA5125732c6c4a8b9604751704b86d509fc30aece353199d8b7535e3fe184b43a6c027ca8b79b2cc6335da0676decad7882eeb9927357355d229def7aea5544b70438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551f3b05a68e431746534afdd69bd2f7c
SHA10e978330b31e33b0bf619c3f3f7439dd9011a267
SHA2568fa76262c678c7cfb494a85353d0bf1fa5691fe34431acfba5d99b279d8ba1ac
SHA512637bbdd87138ea17f6a65c591e9c1d4498ab69a143270dd12b0786dcd13ac1d49af057e87f3043b610e2690240fe8d941996e630c84081cdb3639b33a475e5bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb81f32520e77a12757c8448ad4ae484
SHA1b82e971dabf846033837d9d0062fceeec8dfbd8b
SHA2569d0aaf7044f64f577eac4605432aa03feff828e46151cc7c24a61695678889cd
SHA51230ac08b5ffb2dde318aba3755401cc14b65cd1556ae309cad81ecc4d77245f209c16cebb5bc8b4ff5edf6bd944a9b2e26e4ff6a19dfedb5039672043fccef86f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527d4cde994f5bbadcc46c4f0489583b1
SHA14cc57010864c04105048cd4c8a863ec78b76a483
SHA2567a74cc28d9f1693b0be58c17d2c7ca2e2ed0a523281932027cddd4c2c1231424
SHA512c1fde79de0327335b1c22f14ae521b86396c50ca7cdaf1a0156eedba2d20d728c9d2bb30c904746585795671124a1ade5b47d2addae22ed6029b553e72bf300c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58793ab74a83c93a3df8de09b4645ee5c
SHA117a571068cab9408e91e5a3e05cab1af2e94d8d8
SHA25675b83b5701b4fd1c63cef9cd45bab487406e1963388b377f84f06871ac4b2c76
SHA5120062aecb8cd563b25257ab5c0b916f1d7b397467d2c4d1e56e196d55159306b326537d79198be8ae1d4ec71348a9670989e6cee226cfa30c54dd3b67df8e8652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa824aaa8b2c9204ad7b6b3384d8bd5a
SHA1031f961bf10fbd902918dd0dc9ba5190d3d8d6f3
SHA256dee4fde9c82c88a3c1b82974b1b3d6204db0402595227d075931514ecad2fde2
SHA512e83ee60fc9c38a8e4eb01ee59d0b3a0e1f3fbbf50c69b57f8ca868cd71343b83bf8a0ee22d86c6b95896b8258a35e898a5be63d9e550b823e407ed2a67d32320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5053a7fd255aae6d851a58aa0eab3cb2f
SHA152ce1404848c72c1995192131345624367db541a
SHA256f807e654021611e2cf71885b71a7d424a4cb00319a0c2f264985987ad22a46ec
SHA512f6603e46ac946f2de744ad853024ba5844871a198dc14f76bc2f23a1ec4dd4099bf187584b4d4f3009d50148ef3ca977d67d47b32f7ab9f9a0b4989c66e62612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ecb5b2178d673e76b811d7ac5f3e12d
SHA1f77c7d8262701bfe73ce555d5d4f7e22a0e3c625
SHA2561da2707c0a200bfc6182dde9422592a2452b4569602d8c55da2edecc559d6bf5
SHA512ada257db6430313108ec3859be046edb1da346c09e97591013aea478ae8e1fd1f7fac197be82a38ccca1bec5943d3539937f808f1f82f28c4c742a0d19210c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585006fdcc3e60b1a7ebc7b5b127f451d
SHA123ad11763b039c38c1ee033a9608deb11e149b93
SHA2568baa5b072f24ba9fcd8bb183f02fc35dadedd3152cdc00510d21b6e2d1c50f02
SHA51227601838002a5e7c9a3f5a79d0d6333f21ea2a35f83266bb329b4a04f7336a5b0f5fa778cfd962085db43cfab998bc34db9339c4098da080c4b31ab03658f2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aee640a70fc5a71c42215620979498a
SHA10257f255d2537efade93d24341059f3a2947bea6
SHA256a2f660336552f6e1c3617af953c7744660aebd6640ace75dd55c95ce16bdacfd
SHA5123ead965e4026ab6603e7877b2b7b01f97cd2516f4eb06d938c96c9588800bc04a5559c8b8d19e5f5896f37850a7d604a295486528ac4bf39b3b8b5816664662a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b5bc98abb6841c964e53ac405b7e4a8
SHA1fbda658bd8bf564095efc89e469ae61785e062d8
SHA2569bf20c8305f61fff1160392d5303eeaaa5cc697009f4b939f5e693520de1b54f
SHA512585dad3bc435b709670c1e4b0fa331204708fbfd1f16c219c5c0dc6720d213602d52266c13fbdaa82f1f46d265cfa446fad1a5c46e4f6e7f0606ecf07bf7aabe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\cb=gapi[2].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06