Analysis
-
max time kernel
118s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
7514e39b686cfe0921630ad7acfad535.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7514e39b686cfe0921630ad7acfad535.html
Resource
win10v2004-20231222-en
General
-
Target
7514e39b686cfe0921630ad7acfad535.html
-
Size
16KB
-
MD5
7514e39b686cfe0921630ad7acfad535
-
SHA1
4a6c0de0dc682312185b9b1a0a0eda2ed6fb1a73
-
SHA256
a96b1e0dd83680ceb2445fed642aab4c82bb4502ecb4d2408a6c46e1e3b274b3
-
SHA512
86a30d170498470092f905d9d413c6cc77a45e8c98423ef13d23b843a6e6cbc6eddd565ff724604277bbcccb26b6aeb92f55a8fc92fc21ae7c010d72981398d1
-
SSDEEP
384:Qy0GnKHqUPnaQWvGa95cS3qwqQS8vPOuWv2BHA9JEWSFyQ:sGKKUPZsGa95cS3qwqQS8vPO7v2dDDFj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410721722" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b2ba95c040da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000002656ea314ac44239176876a123e32a2cbfb6c54caa13d436d4da955822ccf4fe000000000e800000000200002000000081bd71764d7bed7a42bc388cfaf3a0947e4a1446644d926e8cf3008ce9ce2617200000003604f1489a7bd065ead47bdd6b348368e9fe455463f0bc9b2e003fb67a10c11f40000000a6b8a5e031cafe8c1ff328989dcab6e1d6f7363cf2400e2de5fda275ccb522441c0aa8279ce259c611966ab7d8b91ae38e4f74fcad494516b8d740ecd974a72e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEB81AA1-ACB3-11EE-890B-76B33C18F4CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2148 1964 iexplore.exe 28 PID 1964 wrote to memory of 2148 1964 iexplore.exe 28 PID 1964 wrote to memory of 2148 1964 iexplore.exe 28 PID 1964 wrote to memory of 2148 1964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7514e39b686cfe0921630ad7acfad535.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c65181e3889d7039fdfda3c7cfcf12b6
SHA193e659d8c22747d1c9e02cf6a515520e201f73bb
SHA256c80d509f62432eff27ae4ea01af7276c2a5ea3c779c3bba79fd8f8e093c10259
SHA512888b870789c44c7ecdbc7181d6b6a0cce3c75147897d147b8bc1932586236491b52f2703ccfef45780569035f830baeac06ba92a39ea2a701b871b87674a8a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590502a39c947de472e016f27adcfcadb
SHA1543029f075cda41750fa3aa5058edb425376a30d
SHA256d9deca31a1b490bd998593812d3648b882688c1a3d20e2857a1f6fde6db58aa4
SHA51235869f679cffff418b82a59ae2edf68109022489af7e0d2e3d450dc4dbba9c53793bc870937aa6badb5475915cc1445ffcebbe0f3be45fbf6691c2193df211e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585723420c4e10b5c459d1bb85e8720f2
SHA1b9a869de5a2c2741712dbc237d9241f939ff8f74
SHA256be5162a551150c858f39fd6571b29e93261ea6929faa176a58345ce750709683
SHA512007300e82331b07af190a03eb8c26ec2c26e1d0e35258e847b1cfe98bdbd5a589be0401587a7eee278c1f41b0866b3a47a670aa03aea3adbb171b71a1e008c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7a474f7387137bdaa2fc5a036cab103
SHA1fc28ab91d836810612030e2bde087d31766343e7
SHA25697a66323c58384ee349374d096a15d15b750a1726a8f0dcbdc56d7553b61cb62
SHA51291efe576703f3c943182f1027e025c6a980700bebb0d7c013e0728860dc142392fa1f476a65c8f7c561945f1496d72b8812c8cc5b8ba42ac9c99c911a4f1ee07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a64524bcfb43cb693f26e6b3fce9475
SHA1ea606df3d3f4989f358bd9e763bb4f438da28c2c
SHA256276cb654783f59c69867d4e7682a5ca14014b68b9c73afb05b67d2b77654bf4f
SHA51266d7ba7925e42d03f8aca1035be5bb988c6f7909ab4ceb094aa19bcdb9c05da00a3db82a36723159f3ce42d430642a42e48c0611f2ecaca360f321fabf71a387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547a0dee53b65e75f858d6a93e8503bd5
SHA1f2dcf7a4368685bca8a448c900f806a752e0abb1
SHA2569c3bd6108fb7c066ff6692b7a6eef1c296a780a9e461192a52dfee2df936af46
SHA51242a4dfaf18c4d659557b6cf0b959617f0f3099c2787f870baff97c7517b23c5039595b2759017f22cd6c5e1ddc1a6e2cb6a6efd48bb22af373dec63847eeee87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca93d1d999d2fd79ae7e32b6d124ae5d
SHA114a095dcd87e4a88da3a4b1b4242f471ec83abdd
SHA25667a60fb7c746adaf4661b8b20dcd2ef96ff43628ce5b7d5b9047b806fad2f399
SHA512ed67137deec86c4eaca85bebf262dc9a1170c8c8cc6b3622423bbe80a630c5076683f169c899ef591293900b93f38e64131a7bfc8503d9d02be0e828f066abc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d83bdd40184c7cc954b15d459bc0ee18
SHA117d9dc84692c3f75984ef38de273aab956b470f7
SHA2566a9bdbc09ebf90e767079e4716261a0c11efce53f60c976654501af4ed641b34
SHA512e5b55bdb5ef0203e3a910a21fc2b4a31658374232c595ca72c9a525cb58dbe54e33aaab698d3cc958c9db4cb3fc424f464f7a7e163d7d8f9ba3254d28c76f825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe642f15b13af07854a6a608ea84e6a0
SHA17c91d95ca2989674b51251be69fee98a4139901c
SHA2565549b78c5bfc794c94afdb963ad7f8e71564b13d3162d123bc42ab367fb1fa22
SHA512974dabe23308eeb7004c20f60df5f6c8fc5db9a6211fe99e29da3966fe2123cd0881c0a6d7921596bb995519af8f0226127a2840552f83f34b56a706d5a40a5b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06