Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
494e63840ff73225d6071b6ae23cd0de.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
494e63840ff73225d6071b6ae23cd0de.html
Resource
win10v2004-20231215-en
General
-
Target
494e63840ff73225d6071b6ae23cd0de.html
-
Size
33KB
-
MD5
494e63840ff73225d6071b6ae23cd0de
-
SHA1
485d1363add28a4c1f5f3216d3a68737d29f2ca7
-
SHA256
26c123bc0e40a71393cd750c25814b6f5f6d171c11b95cb6f6c5e03c1a13ad64
-
SHA512
44a25c3ea6d7baa38b4919833fd651da227ab82c96a9ee9ca39ae1c527d7fd1c7664b485aa3309c910736700365f8c384f574be06e867858bc36bc796061fefe
-
SSDEEP
384:2vzZ4o+aSpW9RTO1rCoOvYABoZgQgt3oZgGzxzgzoZgvY1vYHb2CRQGVtgsYcSEz:qzTTSC1uv2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000000a33608d5216267a633228d029da57a0c5242dc74c9ee747f016c68e9c10ed37000000000e8000000002000020000000d059d661e68c2ce8a7dbfc8abf435ad4153b5ef31f4cf827c8080bdabb0efcc520000000487e32d92b95761f25baca84fa97232f8bf52130549a834ea6c1f05bda91759140000000284b050387eb4c96d77e35c7f26404fd17b490476e683767500421148b7f121e7346d9a123e5439e44d4d444962043030709a1b4e39b7908a62bf70aecab35a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44CA2201-A462-11EE-B84A-D2016227024C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60eaaf096f38da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409807119" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 356 iexplore.exe 356 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 356 wrote to memory of 2084 356 iexplore.exe 14 PID 356 wrote to memory of 2084 356 iexplore.exe 14 PID 356 wrote to memory of 2084 356 iexplore.exe 14 PID 356 wrote to memory of 2084 356 iexplore.exe 14
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:356 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\494e63840ff73225d6071b6ae23cd0de.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8b2defefc808b95ca3b1a5597399b19
SHA117f107aa5f2cd87c1cc785ab40fa7574f64ccaa1
SHA2565ddad64d26c4ba4800919887e32eb83f2a4fff33ba4a8cd86b0932199073c67f
SHA512884344786959d0030819bcc7d44202135d8cfa55c1fc15541621874dfd0c81aa4803b14a02777d4565217bddc07a32f748b247eb39cc5eca2502675e4d7260c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ad580dcdd2314763d6ca6fbd77ee5e7
SHA1f46cad7f5199736340ed2962767b40b187ef8912
SHA256d69ac2fe6259db869f321247908e168887871790365a377dd9bc74082aaa6b76
SHA5126879ada634e257ddddaecad1f39cc8280cc94ce9c9a0878a684f41b35d2cf94b5139380ab06fe6f50f1d2e5f5a99874909b775c333b707e5540f173a1e63ca7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b85964d68c3e00302eb6eb352e966ed
SHA1978a905b62f76185d3b8471ea960b34c3c39be36
SHA256154edf393277e586eaf38d79be7e3bd808e69b9972873305c00230abed08d026
SHA5127778650a9ad988325945d610a193912ecebfe9d4170cace472091d9a23db187932a7b19ee3fd4d376975e8e8c1748ab7d1658b3eb6c7233b152046617c8cf488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa031bfb476a72571095c64fb91da3e6
SHA1d79bdf83a9159589292b4cf30b0d53c322ce8341
SHA2564582e85660fd4ba22eab02d1bc8802831bd09dab4b4d2660326b07d9ea0aa7f2
SHA512498a91e46f50f3ac0bd1131a3631e4031151025bd7a35501aa63cc5017c6d7e7f5405a6cf83a1faaa5d1a6fed441c6856a6c9fccb23596c51c47323acb63f594
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06