Analysis
-
max time kernel
15s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
4d71c70c3d81c5fe99737dda1072b39c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d71c70c3d81c5fe99737dda1072b39c.html
Resource
win10v2004-20231215-en
General
-
Target
4d71c70c3d81c5fe99737dda1072b39c.html
-
Size
100KB
-
MD5
4d71c70c3d81c5fe99737dda1072b39c
-
SHA1
589d04abc5118ccc59e416cda170453c7a750eda
-
SHA256
e66684ce861b7a5aaf57c975a2526be8b197d61bff7ee29ebeaf673458912b1c
-
SHA512
705c12d7eb3ee327bab939edd54e324f9f1f978642b999cc13ccac975d017fd6e8b4fd03bac969a5fef3b74e81a1090ed861f9c57169e5c48038356b0140b3db
-
SSDEEP
768:kkobmmap6D4LMZxusSbtAQpvQzOQBg5c3XzSFZ4+/5GjLmXFhUtm0DCTcb42ReA9:XjOLmXFh6eAMkx3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86160381-A473-11EE-9905-C2500A176F17} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2368 2956 iexplore.exe 17 PID 2956 wrote to memory of 2368 2956 iexplore.exe 17 PID 2956 wrote to memory of 2368 2956 iexplore.exe 17 PID 2956 wrote to memory of 2368 2956 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d71c70c3d81c5fe99737dda1072b39c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575f03793c617bae6c326d755f157f667
SHA19e81ada37abad8fd3c681441221cd96ae7f3aa90
SHA2560f2a88cac3d71a2ad809d46211240564123e1eb073b6efaa3548ee1e52da790d
SHA5129d970ffd5e622fac8a32915d5b649b2724d6fe04197c1db5e04baac6c071472fcb236656539f6be9f6ef07bc29917e90bd676c41b9f348337cfc701181935720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585160ec6ca9e0ba74a31f638e305b3d1
SHA1acce22c4b5157576e5bb45d6a79404f660290dfb
SHA256c6540d5e664a89c9e0e8ba53469c4e0aa4cac4c681a1b56cf01391e02420dbeb
SHA512b8d27d2655391c183068f0d9c0d239e501ed3af958bbad314770e3e19acd77191eee97140bfb3c48934fc1ce0a2785ade073297d2a7b6dc4cd1b609d7a67cc43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561661ed7c529b67eb0670f13553d0f35
SHA1389a6c2f925d0ebebb47411efd9239c1a5734d1a
SHA2564932e1c4bfb5ff72937cd5635c5b813306fe5924523d0c13596a308989697745
SHA51256d92a8b9d20b3f06ef0fb060edd9f88f2d8310eaa67899e8e75d11850498ca088c2f84ad542a7dedf403c4b8b217145489e99b5a7f5b6766066fc12e7d0cb3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2a1bf6ef3888a3b938e9489b0ab712c
SHA1fb251cd0076e0e62c2cf539a544ecb1cead2e8dc
SHA256cbc40186a9449a69209ddf192d43cb44afd00811074a60682f5308d506dc13bd
SHA5121d2cb2e14616cfd9d90a72a25335e57c0489c61deb9311fadac077dd5c36aa60078909f9e051e7d9eb5da496f679c623bf140fa6d96dab0a078654c1f1cb8415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f9535bbe6d6b64dd19592db22235327
SHA1b9afbad750d3c92af4c7151e42c733ae4efbe06d
SHA25621fa7197b1f4b4932021fe6e20bc7968bf8289c264028b8c6133ff3371c983dc
SHA51217c03e2893017eb9ea232468af2549b542ea188607cc37a0e7c4b46fb9511bc51e60146130c889da3ed9cdb378d0d1bf8bda69e5bcb5f2a5299197c4d401de24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5688094ef67236b26e63547e74d48ced3
SHA1b152e9427492ecf3bf44368e86ccef4d8cbb38ca
SHA256953f8067336cb68778c58940a6ae547d72e2b3983ecff635852b9fd6df7d7271
SHA512cd273db36c69dd165f59900a40f33775ced3bdf665d731340ac389fd03476286896cf63583a87d25f36abcbd5f9af6e079877ba9c6edfcaa33a5af863f670dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2d65e133d16f43de550f3b7f933b32d
SHA1994196b2ac19a18ed7f290b9cb3967461ff5479c
SHA25600e5f6bb84d69b2512e078f973e24595781ac63d151e00ed30916acdbf8efcc2
SHA512401509a57b903cf4b03aae99d6f78e72e42634fd2c88757f03b8240ad5b36fc9bf4189df3095440fd8c8e26a22254889aeb835de2202359cd7e1a671bf671b59
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06