Analysis
-
max time kernel
139s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
67ec2de488b1cf9b496f6f68d9cbb16b.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67ec2de488b1cf9b496f6f68d9cbb16b.html
Resource
win10v2004-20231215-en
General
-
Target
67ec2de488b1cf9b496f6f68d9cbb16b.html
-
Size
53KB
-
MD5
67ec2de488b1cf9b496f6f68d9cbb16b
-
SHA1
87982b9706d8a1c1eb2efdb27042e61e8a5aed69
-
SHA256
e1f5aa7bd46bdbc414c85756d475566c43cb7ac549ba465c5a67cd8a8e485251
-
SHA512
211dee31547f4dab0f00e92b1f5ae245194803f56ed778c126bab15e4ed7f3c00ac7714919e7e66b6584fcd77c5134210dd3d9c8c0437b59f94017d1766fc0a3
-
SSDEEP
1536:CkgUiIakTqGivi+PyUArunlYIu63Nj+q5VyvR0w2AzTICbbGoy/t9M/dNwIUTDmQ:CkgUiIakTqGivi+PyUArunlYZ63Nj+qf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000ba2a10007cc3085b5251780620dbd8658642f0b3f95f6919de9f2cf82cf2205a000000000e8000000002000020000000189c064ade81dfc92955f34cfc57a6f8682519727e376190d0a0af98a5543bc4900000003d585da9fe01c654454eaa5cc89e27202da603f0f58eb772fb65449d218c7d45eb658adfd666f8294915d245dbdfec80f028365e62db58df9638042b1570902b298ea94fe8bd0d681765c395bec5ab930c4e14378acfc4b2b3661702b2ec835a7da6d14a0dd03112e02f7e32cc538811111d3d5d70959c61b65f22d7d97280f42319434b815fe1965df4fac5ce3c7a104000000000470ec7a34245a5d85f3d29160a67f69354ac238aeb2a52308d616ba3ba3cd6fd38acfd6bced61d7d0e9f29d9bcdd4f52f3e66ff8a7ffefed44bbe8cf92e031 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86521B51-A4E5-11EE-B645-EE9A2FAC8CC3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000fa5d60f7a7393eff0112d9a1e9e14c0a3099b93e858c852894cb2c621e911bbf000000000e8000000002000020000000da4e026038fc76e75ad44844aa5663535dbc7a2e47fe51532caa277ba857e39520000000187cb24a00c9a8eb565e883350ca992dd613110ca358357d76009118fecd49b040000000372a80ff7c66524a09ce74aae078045b247d414062c7e0bb732150ecec015129a8aa866ea21aa5c8b3468126a9f4a3ff02a36f9d880e0b6f4c1f89f8dd5fdd0f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409863494" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0849e6cf238da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2844 3032 iexplore.exe 16 PID 3032 wrote to memory of 2844 3032 iexplore.exe 16 PID 3032 wrote to memory of 2844 3032 iexplore.exe 16 PID 3032 wrote to memory of 2844 3032 iexplore.exe 16
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\67ec2de488b1cf9b496f6f68d9cbb16b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eea0efe7564efd6bca184b4d297ece8
SHA1d4873a7d5a0b007ca061f01acdd624cc3e3b7825
SHA256e72d9401a030942c69fda59a72d51290493d928e7bc0879b99c6f0f1e0bbc9f8
SHA512bbe86a2511289e40861019723df2a3d8d2b5330186ca5dc95a5b1fc61d8a260452830c5ca4275d9a1db18acc0905750afd48c664e5bb13c9aa329824858cd429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b25656d85b7b25316bb1d94f8b9e60cb
SHA116adb1249ab910f78fd99e8d30613460d8f2ebc6
SHA256ad0dd8001dfccebf513fc452e951d0e6a68d8a48db9a7cd23fa2593ffdc63626
SHA512d52146fd45a45479d0f0c38f16e2023172caf5ce2e56fef278017114daf9c7138d2eb9097f04b789f338b6e18d588bd9811a81b577668a3d86272ff3c095afdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b872610c449c6fd05ac80304542e3b11
SHA1c5f4bdec3e476cac1b8ba2da800e36152b27ff5e
SHA256455d3cf394fd523628c9723e66f5a8de981d8851e53e0391a550afcc49794eb9
SHA512653ed6648353923f08693c9a7dde973a4ba47898bc83d202a8d2002235dd3902a48639709ac05c6208c37300b8d4b8a965c130121ca66a9eaa69bf14875aad51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528358d1d547dc1613210b2131f47b509
SHA110508b440db2c0cacdfc680038f9ef781bb98469
SHA256925c49d2fc70a852739397cdd8e8384bfd95c027f1b411789c4515b71707ab99
SHA5121dbe4cd3a180b055ef88d6bcd475e945841ae19dd13f93d98f49c24a803ac2d1f1fc7b86e279c2bddf1996765c5cb2a93773b116b8cde5e3aebb0d67f16a6374
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JIH1AB02\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d