Analysis
-
max time kernel
118s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
6aead31201b201676e54926d6f295ae0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6aead31201b201676e54926d6f295ae0.html
Resource
win10v2004-20231215-en
General
-
Target
6aead31201b201676e54926d6f295ae0.html
-
Size
75KB
-
MD5
6aead31201b201676e54926d6f295ae0
-
SHA1
fb4f53d82cb8f1ece03715965daa3f27943a65e5
-
SHA256
9586d03e708d7219589d8f809ea6bf7449bb55b56f7669b4f48e4ef80bca8618
-
SHA512
af4ceb1cd762b6abd94f008d94f3e705a362a4324c1b0b957b5083e758524547706e0223a9e2141296043c2338d3798775fcf478a85a9bf428755fe2d711526a
-
SSDEEP
768:HNCd+u4jsnS4mQwUl+2duD1NkI2UtBzoTDDIHnDJWQ:HNRQSjrK+zDt
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409869486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000e7751c4d744c63d8632afa6102dd1c95866f3f356a316510a18b85939fa4b094000000000e8000000002000020000000654debe9df8e6319d5045ff7ec79b88fdf77f16ef8f5b6ea2524184ab44cc2732000000073a494e0b8ab4f60b85af777a18a775b1a34308efc321e0c129828af4f829dd74000000085c91003477e5fcb10508757a9e68b8c001fba3332b28c10535ecfdbd51db15f823b820339d10bd59a962d66dbe94694fa825a3b5449f45bc8b0c124ea05dd65 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{735ED111-A4F3-11EE-ACA7-CA8D9A91D956} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4044bf6f0039da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2136 2384 iexplore.exe 28 PID 2384 wrote to memory of 2136 2384 iexplore.exe 28 PID 2384 wrote to memory of 2136 2384 iexplore.exe 28 PID 2384 wrote to memory of 2136 2384 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6aead31201b201676e54926d6f295ae0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5195f74a521fd8651103b6f87e9764c85
SHA1dbc044fc5357e3f5bfae294e2a68aea3f828aa27
SHA2568304713146349f1c04556b502a9c13aec99306902780f48a070474536d40eeb2
SHA5126efefd5ad2591281f3811593cdea248a2ca75c25da80ac9a1f699c2ed0ef9f6197b391455ceec189544864843c7bec95098779030e35efee786dcef4bdcff813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e219cd4c6c3b9c67ba7b303cd2234920
SHA1d9c198444a1e10c0cb99868f86435482d8e82aae
SHA256c3cfe4425353b3b837e888dc75ce5336890ef222978dc84166d6eae9eec411e2
SHA5125da35885a9497282b67d4e30ca0a6cf42e26acf820b912586c3916407d11b342e228e14a5a50ed9becb18e9fcb4db44b49cb3e4615375cb0211d74e7dfb86b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a308907d5c74707cf685348e7442bb9d
SHA1bd8a5cfc2bf66ffed9f63961ca9667fa499b72e4
SHA256f324b8a11b6f201fd48a651a43caf6e1e1e40b8e7e96a2cfcf26d244bc2272a0
SHA51286c358b7be35fca5b7cc024b4417429a82960d36c98835dd347976da398fcda4cc7169457d7e3ebd2d96b74146ebd4176e371c9ba434bfac14d501d0d8c07487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fd4c6d4c3a2be248f29557c40b096dd
SHA1229283d8b2b4bc90e9a8782d585f7834aeb185e7
SHA256cd6dc01ce6a7033041efb6fa124cd7391c866dc331a01839e746c8fe33a66228
SHA512c963dd68952e9d486282245a7436b4e531f4c6c0cde2a3dafdb78be2a7dd9d4b62e977e59054934836545517a3fa4dcdc184ecf22b0b6c3ab24ac57be55d43f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584b5b208868398bfd8fa4b2356f48137
SHA1d958606d71e31001c22b9535dddacdf169b02ecd
SHA2560c752fbfc97a6cdfb4753eb3e08b1670818482caa6e21378c0bad4dc7f6a8ca8
SHA51211e7374c6270448eb0a678c432dfe92ab10cd3ef282ab54b019a6615cc0efac5d80e1c0a6befac9161e85d656c28d1f62a7bef0c5435ad9277e7ff47d694a6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ecb4f94e341824819e5c3ab6f14488d
SHA16ffc5d321a96d7811758e9e86627ff9da1a405dd
SHA2562239e7d4768d91b416eab2e0e618a756bc1c3780bf6aef221d4493fe47f2c75f
SHA5120c92b36b9a60dcfdbdebdda05a31507e35f39c9535f2d69cb5a89924ccb9488a4a11ae8e0d77e9a8aa22138a7e5018a72e12b083bcf5c2705d12cd7faa9044fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d692c637e66145ea6dfa5150abea58a1
SHA1880b8cb0dec167abd65f6b11e2620e7522a2c3fc
SHA256285d290300dec9cb77833eaf7b567f2ee3dedb713b8fc23d3a611dd57ca7fddc
SHA51269a4dfa7c8027fb2bc496144a2f258aeeca90685707b1cee48b6b48623077bdcb12a4fde209dea1a4682b00d9dba3a6b2e842ed55308031150fca11569e3e933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7718767fc64628477b15ccf9f025d59
SHA10f3138276c4b0649d9059521ee04f9cb18fc26dd
SHA25653507d9a0f7fac30b4a3b798ff83312a3b144ace8717987195109e92b40ae4e8
SHA512efe1e68938ea35555f3af0f292909d250206492fc83d99dec194e58ad63400e89362943c5a0ebcb4a133436f3bed3c51b8e8b787e7ab70750ec7876095d24eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab5c738cdacb85cfc9d97a94207deed9
SHA140d4f2762a166f3b745ae7bb57ece1f22ca53e64
SHA256bee884f24a5663f81e0467b253a99edb89d0b7601b55f19825dca45af47ec87e
SHA5128b5a4ef6fd02eb63ffbf21fde5da8a955f1e16d0a1f4d2f2b0fbfc4c3e0a2307496fc87f0bb5e971b603570429e1ab0c85377db3c95f99bf7b64313760dd3dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54736413a7bc15076864a434e8177a2e3
SHA1f8d0047199adba8dae89060d88f92d0e2b6065e7
SHA256d66e1c78c89946f1f22c4f6e81d275adb9594ece2821a147296412520825e3fc
SHA512419fdd3268397c9dc8c91ebf6047c51f80d6328b11bfec11fc57e509dd8c4cc92d9fe2b3f83f3d0919a7ccd826b881c3b4d7dec2b55b3c2f61e79d9669c0993a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e0159d9db5d787ed466f1b013d42ee4
SHA12f375d03e77fed677185e87f29cd3a7380165c9e
SHA256a999104edf77bb80937eaaa2a93501b3a2d5b3bfd652e5533427b4dee4649748
SHA512a4e7b388bd3b39608b59aca59b827dc1c24f8e83bc1ab8d8267596833a977ba5a210f245c90eb15316776f6179145539fae1fe2b661fb52b776d3344201e10bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ac8094dd6c98e4f34cd819b97759321
SHA17b48ef652ca4a6fb3513020c42be550265fd6671
SHA2562ad9ad094ae2f54580226f1a88711dd56c67d7a2a4edc0ee844ef24e6f5e607f
SHA512d81baaf1952e65432e2e0dba69684948739cef7485b111f1f147ce3c5bd35fb5f9866498f6ec37dc2d9d88bc24d7275660e525081d06bdfcf219ff2d8969c67d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c16d0ab3bf325a402a6bc6ed81d44051
SHA16f7bf02cdf4e5dbc564fb769ddfc80e1c8141cb6
SHA256d70cb6974ea2092ba89c428773a33962f35788f9b9760e53c06809ae11284d7c
SHA5123bc9b3270d9dd88fbdfec638471ace0b50b36efdd35c3e302bacf9a260a7368dcfe30a7f272c502a68b15575140019a505b5c83b872f2e62912cc2244a24365e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536bd5ba98de7b4662c4d750e36510081
SHA1507a20e8eacfb366373b5ee460f8a25535b9306f
SHA256e285abade9e987e628d4254e9dff9ad3c9379e5cc16ae7d8f5d0e4465c1989df
SHA51240275d2bdfe4e585fd25b56ab7b427988b2f5b6c2aaad703c19a3158bfc46af7a78bcc28100c8285ba59feaab977f4234a80578dbdff01c7f46c665ec1a7ed0d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06