Analysis
-
max time kernel
117s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
56ecf99de46ce1597b635befad456223.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56ecf99de46ce1597b635befad456223.html
Resource
win10v2004-20231215-en
General
-
Target
56ecf99de46ce1597b635befad456223.html
-
Size
81KB
-
MD5
56ecf99de46ce1597b635befad456223
-
SHA1
8bddb72a509447de26ec3a3dbf657eb1e6f656e9
-
SHA256
21c059f39a99b72afc9994d7d00016dc3024d15e231885f85bdf9cfc5e9b58e5
-
SHA512
d28b50b836c5ab902908ab2be4a4ab42f67e6f5e210b814a0e5ac14cc056e5e6ee12181484c34b5979093cfffdba59b3851893243f76c5a6f477b59add3880ff
-
SSDEEP
1536:i7Znd1fhZv5/5q5H5Z5e5e5T5y5N5iBMa:i7Vd1f3v5/5q5H5Z5e5e5T5y5N5iD
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704728a52c40da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B222C1D1-AC1F-11EE-BF73-CEEF1DCBEAFA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410658140" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000e1ded02eb6489dbe3da7ab0f6c036ed8ec9ae2318a35d56948b5913ed05cce54000000000e80000000020000200000009ff703c71f01833fa43a0b6173004d0b739f8578338860c1ecbd550b1fcbc47320000000e2b9a9636be1cac42dadfe18f1e8df17eb6fbd1e96e6f2be11242a676a707f1f4000000065536dabaa4f34de894750ee7217b2db6f06f4ceb4a656ed7a713927c7ae6cbcbcfa4742aea97dc050ff22118c83bdf4b69c460133c8f60aedf6cea87582dc07 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2440 2212 iexplore.exe 16 PID 2212 wrote to memory of 2440 2212 iexplore.exe 16 PID 2212 wrote to memory of 2440 2212 iexplore.exe 16 PID 2212 wrote to memory of 2440 2212 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\56ecf99de46ce1597b635befad456223.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cd7e2825e03898f9fa4e4648f66cf52
SHA1dd4246c83049f924eb9b43358d4655ca64374c9d
SHA256996b7d702f6480dde3999e261d3a83d3f63b3ecd7936c4c02676b4da343c194e
SHA512ea87ef348f156836debdd21b3af7103614ab3d9e685f46b8dc39d37b105f7023c1376113b192f19f436239507defed8437db13d0749fac43e3d5ae3bac0df077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c8e1670c7c538405a33d1f9458590e5
SHA199c7d26f6eddc26dcada15c78c86c165e4d1a62b
SHA256243a37f7bb53319b49ec1c1b0317d200e51e50d7b4eb0eef98be9838426d40bb
SHA51221d80abf513ef38fde275a729f5881b48455d8657d7785f035b266254793fd00105fa4f635b15500d254e032c393f27278e6216ad8eca1b41284ec5c4e6441b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580e9530eb3d536ce683b1b89a0c681d6
SHA146154d0887d5a1eb313cddd5b78bc0b0a82297c3
SHA2563cde19e6b738043ea14e28da8f9795bbd7d1602078d25f09216bb6a6bf274583
SHA5122349ec642998810f345cbd5224a9dd00937410930c6794f48b3711dc485921f34f47f68e729d6fb1359ea9db3faf6fa13fe740729154839dc0870b98bfa1c99a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb8e6c00b0630a665cacc7d8dfcd093a
SHA18a0542592bfb9c5b5dd761d67eafb8adda689b5c
SHA2562e96a4c19c488bba4d2d80bafacff8c574cd5af2cb2b51f50c575f0d54c62f12
SHA5125b874510ac9883f2c92ca6c4d1c4c8bffe37310e2c0705cd2f782b87d61554dc964572570dedea6beaaa4ee3c90f7e441e5a31329c267c7bc576971c9033f419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cc9332aba2d50899caf5be540888c48
SHA1fcfec5593ae5dcfbf1de5a0e5d4c46c1f5a6d91c
SHA2564f9dda7b8a083cc03d01b16e6b56c91714ec7811c3e2c5a8fba559f3418bc62b
SHA512934c119fdf51be40bc188cda7fd0062d7e3a1d249984b3075c26309cefbd98b9ff7ca53d531792bdc01ecc819dfcd7ca02201efc3e3c1337231fefefc049af48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e91dba2777d87d720f8fb2ac9c24c310
SHA11d22fe863a49665e0bafc252c6a70645fa89faac
SHA25622a4dca1dd448b233f2b3d6efe02314a137ca82fe236153ce06d1f3e16cfa597
SHA512fb68fec5c8565ee02b9d959be4e4cd6f4e74aa3ad8e07de02493e5233f82990f0d23f76a4388753fb816199842c8b5e5dbd8eba5a83768f01489a074ad2a5a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e8639758b80092a1d55653bff2a9a78
SHA1665da4c5930573d770085037640ddb05416c7a28
SHA256c5204b83a5be01d0852f9b9e7b9e4acb38570faa77e46ed04360cf2a0cc6ca9c
SHA51278ae5a895ec51ef8d8b4e1769e82be1176cd08f96f5973d800933182e02ab8a08638abd97853e3fd5217ad32326799c8be13a4ea04bb16d47d79a889a576a7a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ccd3601d3641a7ef845e6ef4782bdf6
SHA1cd612e1f9e3578d3b65e77f50469cd322d9988af
SHA256288717257bf726c1a464f49e80242d2592ab374aef1f70164e89eb8eacf1e789
SHA51231ce028db4adbcd3534ec689211eb6d8f5f3a9d161090941811aa8a18189f4bcdcc234b5f4a32cd607691d93a7b5150d1325ed742e87fb70987aa9f74daa3da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3300a118debd244cdae4d701c2c2497
SHA1a8acea1921ee94c45d91af77cb9004f09d1c5a9e
SHA25660c846cd71e8bf238338bb557b87ea950521f3dea17102593d717e4f9c72fa3f
SHA5125ddf83d0cf3ca9cce49760771848672bf7905858f136c7c59f6817d6f9b5e5899c8339aa6255d3757b936c5596c9b9aa37b57115bbadca50fd42714942df35f0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06