Analysis
-
max time kernel
117s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
65c1b442b25fbac189ca89c9c29dc40c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65c1b442b25fbac189ca89c9c29dc40c.html
Resource
win10v2004-20231215-en
General
-
Target
65c1b442b25fbac189ca89c9c29dc40c.html
-
Size
6KB
-
MD5
65c1b442b25fbac189ca89c9c29dc40c
-
SHA1
5c2b5a2b555f56446c174f978e4d2c03bb42bfa1
-
SHA256
e32cd1593c77a4aa114b86d11065e961307a4f3ddc8fc457618a7acc8a76c056
-
SHA512
23b57e0b13771d505e9d7d70982454e630273a41111e0338e4508c8fc6454b00fc407880144dad36b6db30d78d2ba59209699009c6da47b138af8e3c72a82a75
-
SSDEEP
96:uzVs+ux785LLY1k9o84d12ef7CSTUvZcEZ7ru7f:csz785AYS/qb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409858948" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1BDC661-A4DA-11EE-BD5F-6E3D54FB2439} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000c12f7e2cbc20193e2ccaca4d766139d3679cf2843efc34c6b42668b2148c0ce1000000000e80000000020000200000009bbd301bb584ad5778ceef95ebd26e30d902b525e1d2dd60560cd61eef35395620000000639ebf54fe451e8c6a975ff5a9dfd519237c8f25aad9d8a6ffdf5ebb72b23fa1400000004da3ed1fc9ee6aaa9a5f71a85ac3d169f40b7cb43580e2200e23946efd9cd4be7d52fd592076ef7ed53b985467fe33db3a9aced985db31ecdfadcf6356fbcfae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e209c9e738da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2736 2300 iexplore.exe 28 PID 2300 wrote to memory of 2736 2300 iexplore.exe 28 PID 2300 wrote to memory of 2736 2300 iexplore.exe 28 PID 2300 wrote to memory of 2736 2300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c1b442b25fbac189ca89c9c29dc40c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f583bc4f582b4e07f3f04d6f90946da
SHA1d1a8e1b40c2972c68a2d1832adb7d93ab247d835
SHA256840cb28c7a54f1c4a99e0665c6dba8f5dd67016fc6ad13ac15dcf152b0837d0c
SHA5127f9fed3b3fdab0c24405e38bf7f2d9ac7ae02eba2111317b4aa232479483485f95c4ca0378d8b8dd666131eae544a0cca2e6df68f26393edbf01f2acdc56ac27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a338640c12b5b1fb2465da8058b8535
SHA13e0aa778b487b606c0edb9fb22506c91fc982e3b
SHA25606c42e123376c863c267314438e483998efff6f6c9980744be1ec7f58deb9100
SHA5127004459cd90f088687e07c690d2e64c7a4ed11b6502487a12a765dc212faabe163fd1253a50ba05731e49772b18edd1ee4fc5a2f29c1a94a991b2a6794754291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597caf22db5033ab65084a7a34dffaf28
SHA12bfe88387a47aaef6a6382b8012f67d32aafa914
SHA25652bc92f265bc5da6bfef5aeeeee2011f1205d1e52d0d4d825d84fa1374458b67
SHA512b87a0192724f59eeed6b60d4b6cc8e46ee3fc9e349945569cd914e78633d9461aa1f5308d59c338f59128d06cb6680f4a3145306e2484c4f039784ec710681fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d455f41dda4c7399b6ea3a2e43a5ceb6
SHA1c7a90db3fb10312aba8ee83f2cc986ecaa127166
SHA25600b52123beaf50a6085cd2a8931aace9fda01e3420fd7741602fcce35dedc9eb
SHA5128b504cf8399be82735ef3b49271dd89ab1e7d8dc15ca28f40f7ee465e34aec0a00e7c44bbf0dc92a8e44e9342b81023132df8ca1d01f5e347ff240a7abaf4a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5405840cf604172f138e135bb34ef66a1
SHA1ff82f8eb2e22338be2a22c9d24cffc1cb01adb37
SHA2569f89d0c45efa97694272cb419c808fd7f8a54b4755d1456b5cf819771c703b25
SHA512fc8ef662f8efa17f0d1d79f6e96a28f13be2e1072e46ac8d7f60a75298f14aef167f6158613d1b63399012d80e8886ae067a5af1ecbbf688dfc3a063092334de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fe6d4f448f2f2c29b817ad143cc31f0
SHA199ed29a5255fbe0eb4ef754c1732dea0ec1848a3
SHA256c42697788a9efdb0bcba4e2ca87f37e0f386b8fffef6f356ccb20d89a67a697b
SHA51231a58530cc89da44371849cc7c57e6f99330b0a84d915de6d17f729cb5bb60a944e1aa373cf1cc390c5522322a6afb6bce84cbd9be64567c44c3134b497f459e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5972533f33d9fece52676e278862feb9b
SHA1aa88e2bc8312760c41c88bf8ed8719e2902fd3c0
SHA25677ef4f967c3b35aec03ec3c87db1428d0e6806acbc96ac57806564123d83299e
SHA5126112b40a2fdf822156baf12ad1c23049ed5924ac698fb5fffad7b2003d13327588fc0451c35af7660e48590becdd2e3e2ce9530eee67e393ba3dba7f6b1ccb4d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06