Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
4e68203285aaf1cf9871f27cc3ead83b.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e68203285aaf1cf9871f27cc3ead83b.html
Resource
win10v2004-20231215-en
General
-
Target
4e68203285aaf1cf9871f27cc3ead83b.html
-
Size
41KB
-
MD5
4e68203285aaf1cf9871f27cc3ead83b
-
SHA1
9ee08212d87dd2f519ba59e222b3476877382cf7
-
SHA256
080af0b9fd3fbc5453a833882f07e71c74535c8913380a7f9edcca9ff08807aa
-
SHA512
1f368399a8353adc22ea810d25fc5b93db0a09db600fc767c7a856625b26ab3d8427e880a3be9718008275255bc92ca279d99038a9ac86330d2c9a8550e87a82
-
SSDEEP
384:amUEylY+lwaXn81ZgSWTkBr7TRVtxKpXT1f+ClVWPS6skwhf9i/uu8Zeu8fOTGeH:yJlPlwaMXLzFtcVWU+c7/Ox3PGG6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f1f234913dda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410371525" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60696081-A984-11EE-A68A-46FC6C3D459E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d78000000000200000000001066000000010000200000009552ecb9591c5b5342ff0426e06258894b979633b61150cb804eed4f45bea2ce000000000e8000000002000020000000e00ace63c9ceeb3caf94b1fb8468e5da205644b0c1b499a960bca1f561bf5d08200000005e44b014abccf2c1caa4c66a6734c514c104030b2e07abac18ab4001679bd10240000000721a8990793dbca532497ce018f16b31fcbe692cdcae63826343fec82ec794c88b1a7e30f4d912937f8eaa7e068c6dd388b55636a85da2eb4667d326964edc9b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 868 IEXPLORE.EXE 868 IEXPLORE.EXE 868 IEXPLORE.EXE 868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 868 2372 iexplore.exe 15 PID 2372 wrote to memory of 868 2372 iexplore.exe 15 PID 2372 wrote to memory of 868 2372 iexplore.exe 15 PID 2372 wrote to memory of 868 2372 iexplore.exe 15
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e68203285aaf1cf9871f27cc3ead83b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD534bd8b4f9487f3214858142edd72ae28
SHA186feef62bdeec83a98779137f6dc39e4fbe13828
SHA25602dd9a1ad99d913ddcc7e68e33244aa2daefe497c5f76350bcd7a556c6bd9837
SHA512c9e38d595664503b0560e01bff54bc7e885d64d90c0bc2903aa022645311219b27470f3ac0b808e3475c0ac7d3b2d33c1a56b98216915306302e23795b3be8ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57a17e63d5a7f39415c3de06c244cd4f7
SHA18df54f7f8d76b11226e8b1c18bc7607111d31a10
SHA25636947739103d224f511e1a6da2e5014ea267ce987f93c21cfde0482ec0abdc2a
SHA51247473836d2657e198c0f79c170eb7a275b05bc9529c50fee623a4619b585c7a7382b9624064e84e9344066486ef3509795275b926b4b9e8925a8ac1750ad96e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d52c651151d697972031dfe53d91499
SHA13e563abda63d9eff9faae1241e8b47c7e56d8b26
SHA256bcf0f99a360849776f5c9bfed4c277d0bf3be9d6659c3080d03afad4a17eaeb6
SHA512f4d0a620636a53c5e49826cb6453a4a4109c600f49c2e6a87343aa7c56e4b47f1e501f56c925505ab46850d44c3f990d67402bedac6cac62a67a68d933d7d775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565b19dc930ae4a575d8446aef51d5203
SHA1064224b99dec8caf3867c4f8bb9e53dfdd54af64
SHA256dd6ddf33c7c8c2bf32c3804563338a90d259a9edd3176e6ee2b7f5cf46cb0196
SHA51284563cf900f9fc9a2c005f162577955f009de71fceb3f2b98d8003b9df229630025b53550b595f397b3439aef2222dfd09cfd1c2e8a90ea97142f0fa63037ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b331aa5e2eddd5a77a33af66f178de89
SHA1689093c1587b58ac85175b9987bfb455a87e00ab
SHA25603b20eea311c804d206335c8b77ed41aa45877b83810d2d6a47a6039fc8bb9a7
SHA5128b816d00417f4d71706e57cabe84240901c417fa491c63c6b1e1e337fd14b0b0f4d7c1d822280d8afcaf552a150c44635024ccf68bc1207113a85e7b61cb7671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a18f689f03bd318bc79298dba0b83287
SHA1979b8e995eed016fa04d94bae615f02a4bb08124
SHA256de1c59395909706ed22c5eca1f014574b30903de1ac9916b14c44def436d3c5b
SHA5125b3ef896d54346bebe6f59d6bc331a6456f1040ea20a0c8b35c477b310abab6b97875c463d87cc609998ce22a333e16886b02342dd97fb38e31182405f13e500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e76cb58f45bd17e4d5bef1be22aa64a9
SHA1ba868280fee773d0cc849b1a458444d13771d89e
SHA256323d3a850865a53e85bb3f663cab470eb19f9c9c6434c44a9bf0e9ffe4f56122
SHA51246805aea234bc144c6bf3105a7cd5c7bbcf21560a5c68a105ccbe353224226fc6c8d6c80d79a25cbcf8c2967057dcab12ca6fa33494844211789857a3ce15412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06