Analysis
-
max time kernel
120s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 12:22
Static task
static1
Behavioral task
behavioral1
Sample
6e2907ec7ca288b3f8a3cab22fea2e31.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6e2907ec7ca288b3f8a3cab22fea2e31.html
Resource
win10v2004-20231215-en
General
-
Target
6e2907ec7ca288b3f8a3cab22fea2e31.html
-
Size
998B
-
MD5
6e2907ec7ca288b3f8a3cab22fea2e31
-
SHA1
3c9b5c58ea587dedf86c46a768bfb3fc3e7e8b78
-
SHA256
d02fa4c51b4ae24195064ff32259df1d139ad9f3c320ff56a447a32ce6b71c3c
-
SHA512
65f4713f587caefbd939a6cd3d84dd2e0d1a9c4d230a1d6fd9333835b94b96fee5809bc895af67d378e97f3d7483e291aedeaff11f4045a66dc9758f3b91c940
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9014190ca640da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410710335" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd769173341890000000002000000000010660000000100002000000038f0881aa65aac69d26962e7edee77695d079abf29bcdd7938d4590c3be3046d000000000e80000000020000200000007b16599d0fe8ab0fcaa8fbdc2c1ffaff2595f91a0b45b670e58108bf4e16f04a20000000abb3d0ba95d62c06192d62d56e877126d6357c95610554ba47b52bcdc7e8cbaf400000002af3bd4c35a5eab5ed30e870063dcf95741ae8e26b7b0091b4e35975de61a9fa20bc04f23151052d8ee07d1f6d74e31e2fac47e8ca0a35a7a1771db3bf527695 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3744EDB1-AC99-11EE-BCA6-6A53A263E8F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2644 2044 iexplore.exe 28 PID 2044 wrote to memory of 2644 2044 iexplore.exe 28 PID 2044 wrote to memory of 2644 2044 iexplore.exe 28 PID 2044 wrote to memory of 2644 2044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6e2907ec7ca288b3f8a3cab22fea2e31.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55869f364b94ffbab6e37c9df3faa816f
SHA10edeb63409e709f8073887cfe277d3a827f1507b
SHA25623c5269919ec7ced663f328ccb424b4f8582d64e5e086869c6939051aa39115e
SHA51237ac2b21bdfe4fe3e05a50d2e74ebfb16de1f199c8d0a83ee659b1195baaa4e788d0a88b16d541f5895d5f94fcc1650e1fd1d226046dbcb7e16030874c7331ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ecbf255c809288e78c78f2ec5c9df87
SHA1b9e2146d4b4f1b7eb7633dbfbb25b319fa8691c2
SHA256561cbc6072583c94aaae4cb13028c6bcddfb0aed79c487283ff3d861df06c981
SHA512245bd48e9a2c072b5efc503ba76ac3d559f0bd477184adc21bb2af3360924d82cfecec4bdff8c92b288156d83c3fb744b32e5b6f9ea25d37c724de92890ab344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e90eae71d1582280b686313602af2b1f
SHA17602bde67a5a8dacddc37a12bafd6106d2f3c5a9
SHA256cf26a2038b67f1263d3d7baf66100df9789d27ed693c7ac73d5567f9f1b8bfa3
SHA512f1ea7a444953f5fc13956423466ac8489ae8b7686acc107b028f2ecd3a9771a83c41939fb48eee46ff005247592cf3c6219d89b2491888567e36dd31ad2ecc57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5739a1da42f39f44a5d21abdc3a33112a
SHA1a535c75774dd2c840d5e1e7763b3dd9adeabca4f
SHA25630fc2cc141a570cdc073483c8609c87d8d216f3a615f5dfcdfd16ddd21303bbb
SHA512a77feb190e5951f4b9d38944768259cc52293e4192f349e9d6bd493f3414f8cadc3faee6d695573312a7755147d63ebb81d11d14dc7d570b7d233966db0c5387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5115d060d36d1a9d60ed3cbce26034f16
SHA1556c5f8573496c592993ff3d0df25621497c215b
SHA25680425ce1ccc4186b5543dcae03f37fb3bf36152d07d1ec474cd7d7ec9add2323
SHA5121785badb180d25308230a9dcbe963972ce0c1c298ae1f8d8d8528a06185d3bc00ffbbee54918398a375ce7bcb37c41e7a90a6b77d93d96d1b3b8c74a5ec8bfdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5201173dc0ff5e5ae768c5015e3b5d358
SHA151800224bb1d3599c9b80587942f4d270a9e8887
SHA256cee6004a2780c348e96c61df2ef2d1dea39ba0b810f8e9271565662fb7fda322
SHA51259c9f7abb9174246aca143ecf3a0600926f8089d7f2f15a606ebc475cd43f141068b0d757e3153e034012d5721b4ab144aed5aa3b5cde0a007d3464775f8d62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cda823b5292ea6f0e02058dc8c88243
SHA1100d0ce004d625727ca04ac2bc1005b3136bacca
SHA25687910ab966e959efb512c89052909df7e2cd1ee01ceed7a8ce8c52db0c0fc238
SHA512e1240c4e8bbc53172786307d8769451e6192d1606250d0ef97339c6a08a4bcb132b36c278b720b41cf91cd09f99dc651dd81d3c1259d18f62d167bbc9cd13e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0088d0de60c286c294079ced02cca9b
SHA1c88a758c39bfc51de5eed2f307653204ae230b5c
SHA2565ed2fef3f12c0a24f64fb2c9b1f874b11f202dd44b1119c1f3be75d5d366ff64
SHA5125411a210d226f1b7fa6e1a294b86e8faf02c7ecdd3501482c3d41bef2b4a983f1339d5202c3508bf643d5033a722fe5d968c11088ec0ecffa641817eca0a4f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b010be783cf4ca5fce121e8256c7f22
SHA1c7d3149bb348c94705ef9bcaebcd86ad6d09acc5
SHA2562c40f4b1309602747c7fc74219e8a4df076c3f9bd1c1591cc1043cc4cabdb213
SHA51267ebd630ddc977da55bce79e62f9b4f25e56d53426aa372c5043a0042975e34f4515e8df633ec4bf9a9242de1b9f5edf1f8c9afb9b9e76139fb5f26f188d1e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d16736d989a65c8c7db75b56fca990d0
SHA18fed75c00bd37446377068e04c42ef34a82f5967
SHA2563698e049188120ca3b823cb3bbee66a2a64ac45dec69b8a797a36e3380bbab68
SHA51294dda7b6683e748723643c3740b69ce708f282169e7bc781df5573feea2a11eb375a0956126955c7391dab49a0e8919c312fb61ba9aef4df5b967637dab66c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587a3b32d1d74cca4a24b2d120a6292b7
SHA1dc53ae62255fed629ac6813f170833ba083151dc
SHA25659b8db7e382684c0a01d2e1a4858a13bd413d13041d949a196bf5c6a8d03c158
SHA512e42d234b6aa200744fa1e1eb1ae3a0b86f84940f215f79cb3e1e21165eb2d67095d69554fc47c98a9958d3c20df825eaf66f538480d79c3e35148ee562d3b922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3a3924e1027e5107b593effca530a36
SHA10f910fe87efca1e2a943348dba2169e53eb29e2d
SHA25671810e67eb057e8732630c4dcbba7ece313170fa3cf840d5a06eb77cb6382da0
SHA5124a7144dc619161b863eea042cc3e8b21a455c67b8f4aa5e300241cc22814375eba8ed119314885555f8f3c57f79571c8d496744e3c9280bd5acdcce030aa91ba
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06