Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 09:54
Static task
static1
Behavioral task
behavioral1
Sample
6542cb585ae23883d7200ee96e8b94ae.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6542cb585ae23883d7200ee96e8b94ae.html
Resource
win10v2004-20231222-en
General
-
Target
6542cb585ae23883d7200ee96e8b94ae.html
-
Size
1KB
-
MD5
6542cb585ae23883d7200ee96e8b94ae
-
SHA1
812ec6f9655980d01a5f0fd49243409bc54a183f
-
SHA256
3e569a211f3edadeb8a1645b032db787fe5e4c18f0055db517e0e43152d9b4be
-
SHA512
55f4f450a5c9b8cd434b962b8ec3f92968c299d0f3036254f3e17ac588897aee8065396ab460868ecacd6abe1f4085edc176e5af43f58ae9833fba342fc3e2a9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000005fcd2b5dc31dd36f590dcf66274440d0d21025a9287341bf9b41e601f6293c56000000000e800000000200002000000014907b316d7920861dd1b056203a0f18b7254093dfd7b6ca3e95adf5810133be20000000d4b80a9603edcf1f30477063badc0d5d75a7374a9a2fbd3f90a8c5079446628b400000000c58ccca4a51c266c1ba8fcfa4b0bfc31a9147e49b812544cde27bbe44d5b765d3654149e9eca7db6df3d8293e47db89a1b67f3d19547c7e1c0da74be2649edd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60fa8b7ee538da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409857970" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A91EB831-A4D8-11EE-B279-56B3956C75C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2448 2212 iexplore.exe 28 PID 2212 wrote to memory of 2448 2212 iexplore.exe 28 PID 2212 wrote to memory of 2448 2212 iexplore.exe 28 PID 2212 wrote to memory of 2448 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6542cb585ae23883d7200ee96e8b94ae.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5878cde37624c2c897335a2f9ec010994
SHA18db81a20e9d681648221ba65b034726bcb1dcdbc
SHA256a563a9d92bbea85ef6bac75ea2504907663e39b90b9194d942d83a97c5df0e34
SHA512c164f9d70633e68b41d1364bf0fc5762d091ea04a218766d1308cc1a716a8a9a0f6f2994d558dc8fa743e9a1a25826fde2e54e9f5cd9210f4da5de1d87f17797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abd276f1d893dda17cb22b71f5c9db0d
SHA1c9bb15f72d4328606255a5a3a35714dab8bafd6c
SHA256fefe46423e944b332956c722c3d8103dddee1c45acad6c2191710c40dd0dffef
SHA512a65c74c640cc27ea998bf464809a65389bdea61ef8e66d92cb9f6f77b15e95d7ad7857fb8b83a1d5b3fac93ecfabfd0c7057493e73624590a3f90304ea963817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54836f47d8f50015b20d3e49811bb59c5
SHA13cd4de25ebc23bbdfec2adcb25073555859c9f76
SHA256fd810872a8cd4f55c50b559a485342c6474b685f8c1e6fa2eb8cbf49cee68259
SHA512f4908c73796105e02de730df3818d2177f14122404fca00f0b981b2a9d43e9f648bd053faaf880d02bbc395f7b118b7606033f37e11d93f277c1072e02fa4ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f00cf0bab336afc2ce0cbe0de34bd7f
SHA12dffa591ccdb96f76dad4d4a0bdcbca7c4a980ef
SHA256c703dbeb6f997044f464305688fcd552e60a40012ef760b4263777dec6166edd
SHA51273f813809c0eadbe64a87363df93a3eb5ad41f63688500e29a2437dd41397320e939697edce65e33f02bddf866f8c2693b083c39c278ce8d38f3ab657094775e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af823da4031e1252f589a913ba53b9a8
SHA109950a7020fb8864b6906cd86f26bb8c50f56c91
SHA256af6e2fa269ee8a56e85bc15d56556a5ea2d0d7ad7ebce00bc3c767285f2cc698
SHA512565eb968aadc9f7d77467b53e3bcb67db93892616c32223232b3ddf82ba1b34a7781286e389ef11400ad04751d150b308cd2b5ff5436a57c074e2e51ca5ad131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df534fae01ff859aab765b44a1bd80a6
SHA1b15f39dbf216a939c82a8d57db946659d034102f
SHA25631cda310bc2af119064ca56f8abfb3f57f04df32f4bc1c39b2e53597f8a979a3
SHA5120f33525c1a04b4d3cea628fcba88e8956542eb26c2e3a5150a243ffafb9ef84de4f71dfe74eefb598c519981b2e93117dc7b523c3cb25abdd52a6fd7e07d9b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfb7bae152591bd0d9478643417e2a48
SHA1d3bb19f6953631d188e37c36d0ebf22a5bd36b4d
SHA256d8575f222a569615c1a138c4231a3c4871b61df05c66614d82c43e494574bb09
SHA512b78d282090992b6baafb2da9420403800e8391640a3d196d7da239104348175428dfd30cd95cc08f04e12955563ae68764f861e4400637b659cf2b62d5b55244
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06