Analysis
-
max time kernel
118s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
583b92169c6ea0c8e252bb216ae0f214.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
583b92169c6ea0c8e252bb216ae0f214.html
Resource
win10v2004-20231215-en
General
-
Target
583b92169c6ea0c8e252bb216ae0f214.html
-
Size
1KB
-
MD5
583b92169c6ea0c8e252bb216ae0f214
-
SHA1
b76bd40575a831c259e8860e33b679bc839c9cb4
-
SHA256
952f8bbd8558a846940995cf95f0d1e447c67f2a53aa96233b7ac513304296cf
-
SHA512
4dc1723e1bc8ee24e56dc56e5ea609e523d3f273a0f41b8e79c5f9d7c6e548cef3337c6301b956f0744e20cd7fe406213ba485d6109cf16ef952dfb2947814fe
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C30670C1-A49D-11EE-A031-F6BE0C79E4FA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e020649aaa38da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000ec11746f3844bf3b25d7f447934f53809a12d666ba545f3b8a3c7379f6fbaac9000000000e8000000002000020000000bcfc2e47372c35e9d4a9d448f49fce7ed5d52cc24713c1a54b9e8c9c7ca71ee220000000ec85f3bd035434b21f7e632e3e47e9dcfab43059bad25579c01c8adc4e28644b40000000a5ba2c1d42a0b0917253b18b88c9ebf90bdf85f356909b0ccedddc34e42ebab50e9835b5bcda3379f7446424940eb6387efa935b0af99147b6886070c8b779d1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409832677" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 1884 2996 iexplore.exe 18 PID 2996 wrote to memory of 1884 2996 iexplore.exe 18 PID 2996 wrote to memory of 1884 2996 iexplore.exe 18 PID 2996 wrote to memory of 1884 2996 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\583b92169c6ea0c8e252bb216ae0f214.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edcf6801c108a3ae39b5d4c8c87067d9
SHA1fc3396180a51848643c9958f2d8dc0edf08f36e4
SHA25632ce1525956da5618fac0f27446c39441ef3e7aeb760b6b8252d31f860bd5fc7
SHA5123ffab0b64eabde05af491a21872f077a52cba4eb3ee6b2cf553f07b6f756c1c41981a317d73f739e13b87fcaa70db4174134e86ece2baebe7d7de1edfe83b846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8a5ad8739e47192670afb85be93b866
SHA10a0d56cfdfebff0c7805f0229dbb23d992924e51
SHA2564e196ac8218e47b631998fc8427d737af627ea4cd400281b9cd2705c2757f97f
SHA512dae68ce63c066f0e8760800ea337ef0d61ec4b51d4a032adcd25907b69351b3b20a97da157cdf75b5314eb608af39d79ad7c45814b63f83b885fc53a6953ac86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bc32a7972b37cc7dbae6c063cc584ea
SHA17515524784bb5e0480663ed495eb5ac102a63d7c
SHA2562aaec2e25eeba8b9c21f51477e31234932f57a38ef2229fd4c7f14e8f6da87a4
SHA5126e7409def1208ad9d5e8226dcb20e71146b05c9b59052e2fcea2562cd978a2000a014fc57d2891a65f3f694dc577ab3358fbc03b6e64cd30301bf34ce9b269c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7f668be863426327df3e23bcfef82ac
SHA151c3c0080c7a16a797a0f239a3b05e25f36ea526
SHA2565514f24023a9aeaf8db9112fd6b856de3e14b67d45d6cb8e0cccb7266c3ef56a
SHA512e5f71a9ccb8c829bf0351a3424fd9554f96cbf373de416340d1ecef073ab17ba846ba1be7da8da010c9b18d41ff4e2c967465fae04dd79a847f74961a1f23920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c146c010c2568792f8d13ee8c0636fd
SHA1458e098ef1e1c0cd254c9c1fd7b16c6067f90118
SHA256b535d47c1573ad30940f1f2f7b51cdb9c30c18890dfa1029107b966e5fb49cfd
SHA512b8854561fca4d6bb117e959a7a3650cd50a847baf38decbbcd82b713d75075696fb3e4eb2e9c958720299998fef715849f7c2902aa00755c7f0c9bf013d6eb7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54860d9cb96a84a26b37f835fefba532b
SHA1194c351acae9ebbae68ba1963b777107ae935da9
SHA2562267e56cbfe42efc09956e9203768a01f5bfec1472b6c96eecb61a2805097ae6
SHA5124b9645a2b72c85f85c7e7ab357f81f0d0505ce1192703b6c6d2a73f844765fcefffeee7b8166326bd0b4154550b3ca4fe90280617cc9c7660e97793c898a5056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5888b318d31b3015cc09933690fc65e52
SHA1483c0c8d59c15e7432eeeaa86ca1ef78a88c74bd
SHA256d16f9d459f3a99a7f472764e59a8695388e1d99bda0d07ff2032bb318fed645e
SHA512dcbec38165137ab04e6cc2aa13042bafabe11add5165a6d2b61fcd79ff8cd5e5566aced727c8ce0f4150901ba9ba7c4001d22a9fd144f3434a437249c8549edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5852e92bf6bfc0913a8b77de7fd04c84f
SHA1942b1a1fa013944562d2062fc12666c4c1b71d6e
SHA256bc0d7a451ad470c8761025b1e9e21a07bfb8d0198f5faf9850cb79c1ba851c36
SHA5128981fb4f255c22e771224217f6b1ba961c6182ce77b80af373ebe64cf52c4e544faeda9a7138a992fd0cb32295c6d71d86a24d06b4383429ce2db071e2cf3de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb73f7be7dd8a3a2f4b314014fe7554f
SHA1f71e5777cb4c9744e960ec92003791401cf948cf
SHA2564c95e8f3a01d3466f396f4a0a2d2a856015e36ba50dad6593225f5760005ceef
SHA512610401527fd63bd98c1563059666042da066269bbb32999aa31dac6e33483a059a234ed04ae1ccf0b4277e6ce713cbef94816389af7afa84b0c59ac74c8b19b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543285fc2a74181a1729e3a1656074762
SHA1199daf7cfb07350654fde6e77bc5263d11c36c0e
SHA256954e4e1972a12637b4450f93ee14585310e73ab437ad7b37b5608efaf914fb4c
SHA512b9f14ee5c57b4da8da9d497c1d6dfb50c288e0caeb069886abab0a16fa4f906694d862a10a40c01a87113c67b7904cea14be5405119fdde7c321ff4358eb5e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5710561f46ebaee921d6af17e1c7205f2
SHA10f1c7ec58882f21f85ef31085715dc5f617db0a9
SHA256d66da6fc371d58bdec1c8bc1be8180dc796beaba9c30f7a1fdcb3acdfebd4e4d
SHA5124f5ea6225bf79ec76188508bd2ec704097d4552b78572e3bb8f0ed04bac227a9d62d4452881334d3d4ce0d2283c67a401e553c898969b52e15952a358780318b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06