Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
69df3845e1c15f5f8ff75717ebe60018.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
69df3845e1c15f5f8ff75717ebe60018.html
Resource
win10v2004-20231215-en
General
-
Target
69df3845e1c15f5f8ff75717ebe60018.html
-
Size
231KB
-
MD5
69df3845e1c15f5f8ff75717ebe60018
-
SHA1
1b0829b9edf3a5d86cde9c427605dd34c19b8186
-
SHA256
826a185e3db6f259d5fb6e0b52c9182946b8a3c945859d5d7f35d3d0eb66e204
-
SHA512
d4eff567647c3309d6c89e0d66b9a193c3fcacd87c34f1124726c459c8f4aa068678a9fb2d9742035c956ea51dc1da07378ec4df96607a2153c9a3f585289bb2
-
SSDEEP
6144:E/a3G4k5QhL8atVWArfNbYaaLStRyhbW6Snj1Cdf30c+JYxWUu/v66sbsGon4G5O:93G4k5QhL8atjbYaaLStAhbW6Snj1Cdh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e9178664000000000200000000001066000000010000200000007182996ec24fef77dd9d994818e012d3984387975babe13e79ec17566e8f7beb000000000e8000000002000020000000890f0a763530fc6460d27480b6a266f5adbd7137e79055e13f7f1ad7f93244822000000001c4df81b9ffff9e1bfa61806d98c0592d180fa5618e33633f6a5be84c70793040000000e6f7e0b5e17e52838059c6934fffc4b0fd29cdb93ecb45cf841a705d90e88348d1acf8399ef00537e5c830152a7559d30afbe0420418ba3df59d3248bdc91091 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410702574" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1026f30c9440da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{289B4191-AC87-11EE-9735-D2016227024C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2688 1712 iexplore.exe 28 PID 1712 wrote to memory of 2688 1712 iexplore.exe 28 PID 1712 wrote to memory of 2688 1712 iexplore.exe 28 PID 1712 wrote to memory of 2688 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69df3845e1c15f5f8ff75717ebe60018.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_1AE11409F57BC5D68541053A9AA94231
Filesize471B
MD567b86e635c2feec9dd145a3a98d3aaf6
SHA18ba117bb2273df8e96099ae7e0ce181aae027ac9
SHA2565af11ba1b706a17182ea2ce45dca4ced558478186000cd558d0c9e1f74d1f35b
SHA512d781a76a504113058ec9277160b6326f266410f9f131bd0d5e2a4c78a30b9915f43c8cd35a6df044d53bb42f3d0699d4a94cc8e5f9968fc3ae9871270b071cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5360cbcd43ce1c5e179fdbe92f5953815
SHA108f626beceb88cdb53f5d78a1ba81455c3034086
SHA2562d5972ed2bf150d764080a06d5993a6b0e87714fb9f63da54a48c6e83e67d5b8
SHA51259a4c618b0cc4af1104cd71bab7c930e9b830a7c182f1aabfa0813738b83bf65a6e3f2405d286c6aed04a37e57943bc721b4c54f0b7e2584e869b312938e2955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541c7d4453e72bf96b6485796c27966cf
SHA195290bcb2496b087e9e0fe95b738f49ae6d8b12b
SHA256199101c6f4158558d80f8ca1b26f57ae86486d9d2bbe51428e2dc08a59da7193
SHA512bad2171cdb6a6e12c47a720164f536d100b4ff2083e2fb76c26f78e3d404bdb055c5ef7aa32a56de91b64111352418c2daa4e235c9a6d9143bfa07fa8c3c1c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e41ebdcfd81a15b9a4f19fcf16981481
SHA1a334b33a6a2cd3a5e1161ad1d03e535cd7616b24
SHA256f49b4a64ea698a89d923a66249727df7b93b99c15937339ebd3a5a6b65ef5def
SHA5128dd5ec776e48b2ebc93b58ff6b09ca76a6eb09f4ab6841a9cb48b3e3065e62542bd022bc4ee5ad9ada2f74e16e39ea27f4037e706890db0a71637d7e6ad22618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e93c60fb53f0474161f9c04c0d63ae1
SHA1d9ef0cfa465bc3cdc913f52c5637cf9458e291a6
SHA2568bd613ec37348c8efa22d4f807d38dd5018af24f24bdc7d7227aea73ee9e34bf
SHA512157bd60d165d0556f1a2258384d871d225f0ab34fe9d1a0802aac783be160034c2f4cb99cca6b30d2316264786ae29ed620182801492934bc036538f4b72f992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583343d7c8b998f50e6cd8fa8a12abaa3
SHA158bf640e47b9cbb61d3e8deca1193f0d9c003a8b
SHA2567717baadc353df789a3711913337b82b5329068bb0dcd8a3533a7ee92707f1ba
SHA5127d6e9343bb7f0e5214c613d5b40cf19ed418514167e506d8ef51fe84ef7818b11bbd499bd5e0af1a69a1a00d054ce08bb7c3027147342959b87da11121d7a85d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e25ebf603676c9448187db024f7a3e2b
SHA15641803de4d1d47a314b94766ebf6cd26a00aa47
SHA256c2f9228fc8e8892b48e22c548028b284a174b78c2abfd0c2b54abe805e69df6e
SHA51278a3d0f65ad3c84c7cfb7581e2a1dedd786cce143d05fdc41265076778fa8cd1f498a65bc43cf04bdbd409a67bd271e651b7455dcacadbb98ab698aca2b41c30
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A89I98IL\cb=gapi[1].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A89I98IL\plusone[1].js
Filesize56KB
MD51944af3661da46249991197817b6cd8b
SHA1f952df40ec79fafc7c798f37aff92878977376ed
SHA25663326a1c4e0eddd3501f0a064b06a2708eb0362f3ae934f53145978d3d0799b5
SHA5120bef19b32be337cfba179ed9ce4533a207cfe645d2e5fe0da9fadc7b01c72704fc89749670d1ac48b8d494675bc62ac089fdc4d8495979226f10828225594376
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U1J1BPYJ\478691279-postmessagerelay[1].js
Filesize12KB
MD592169c8a0fbf6e404267d0705cdbdf42
SHA1a5cd88b74ca5ced239cdbfb458fe25540d671f46
SHA256dba668b49a111527aac8f616b9053ea57c944e01a84ebdcd02a13da921223384
SHA5128c5d35ea512fa7be367cd9a9ded2f23822dcce730e5502a355ed0d48949ef763eab13be0d50a66de6b0f8419d6a002c12c4ddbf20d97f5393ba922e48a4f02e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U1J1BPYJ\M1NV9FZH.js
Filesize157B
MD567e216a27dda24bdcb086c2385b0cb99
SHA117141c80f5d32bec3691c5ab24741d8b7dd5f0c6
SHA2569dc433b2142d3ba0803fcffa53f19d34da26996d20c829df6d694bc887325dd7
SHA512802319543dc64cb011bc2684004e878a842b73aa55e4da1141ccb8650cbf42fabbf2b46c730760bbfcc7a140e11700244b9f5da78bafe9fca7ec7825c12b4255
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U1J1BPYJ\rpc_shindig_random[1].js
Filesize17KB
MD5f019fdda31635d2a31b151ad8ad56c7a
SHA16adcbec55f66ffaef83d9a134423aa98eb2a2189
SHA256c7fc0b1526533002c956ebf8e8c42c3ad3f96c41ace73fb4063cc89051944831
SHA512fc278c12316e098976833882a38c788d812f9d36bd1b9b2b8c87dab4dc906af26a860df95436ea1b7d509236d44d0533d475a153437f8f5d42653fc28a77ad64
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06