Analysis
-
max time kernel
122s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
7988d06871562a0ee8173a756bb6f360.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7988d06871562a0ee8173a756bb6f360.html
Resource
win10v2004-20231222-en
General
-
Target
7988d06871562a0ee8173a756bb6f360.html
-
Size
7KB
-
MD5
7988d06871562a0ee8173a756bb6f360
-
SHA1
69843bef41bdcbd2d16948bb4a0dfb36fcc0644b
-
SHA256
e326637df870563afbc398f6694d41967b2e4b1525d4a6961ac3950b1f9863c8
-
SHA512
33852414c3e8c71d494cf9f8b247e223ff042593eab10ca1c365f2cdf686ee6c231b9b04fb9cc63dfc19ee463da85d9efea3da251f6aa1e6fa1d01144d4d916f
-
SSDEEP
96:uzVs+ux7f8LLY1k9o84d12ef7CSTUezMcEZ7ru7f:csz7f8AYS/0b76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000b25860bb173fd33c08995a58c0dcf906209596c35bbed6e8a4214c962eee6493000000000e8000000002000020000000f43793cc1c461eca373873534547ac7a49b355fdfa0545868ceea92ec86ad42b200000001675cd87c9800d2c2659dd14de2791b9257f742335d0e4c83108e3778786fdc04000000047f2a3c0110a2524f5225ceaf063cf08f8d442a064119dc41fec13beb30aadf2409573bc5448ea4f4043f601a5fd90343f61626a41614e3c1e5b84986e273ded iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30F78781-ACC4-11EE-9673-F6BE0C79E4FA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b09b06d140da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410728783" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2704 2368 iexplore.exe 28 PID 2368 wrote to memory of 2704 2368 iexplore.exe 28 PID 2368 wrote to memory of 2704 2368 iexplore.exe 28 PID 2368 wrote to memory of 2704 2368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7988d06871562a0ee8173a756bb6f360.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562dad4da84fff1666900528ad619d65a
SHA1d6b0ae543d1ee30aba2abc03bdfdb4e44aa2755a
SHA25678bf81314366633351451cf8757ac1b81c9ac3a5f6e04c5fec6a284789dc4504
SHA5120c53f91f1cf148b056ec91328f5d9f2ab9faff96ef0e10954b3ff7e080a299778e1a14c6870e40e4c0fda9ffb3f2f5d05bfed88a965585acb7e22baa4c191bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568f2bc8dfa6bfd77d6d99ca94d0a31ff
SHA116a1f463df4f2f543a79355499ed01bdd585e045
SHA25635bd5804251f75426641806d20b491383945ffc37c04c0c99dc87994df9baa72
SHA512d2e28724c5d650011a95b536b504b965cf7ea10b791379c5316c3228f5d1bba5c6732459e8f8e9d42e178335bd2d027818bd47693ea5af3572e73fc465e488b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5137d105cf6dfcb834e8e257f33f979f3
SHA1d69d2ad475d8f5f6a8144ef1eee81689ff3411b3
SHA2566e3b4e4fb929ac40fe9e07c8ab9dd371467a08243bc8571e69505f0dddb4811a
SHA5127f9e7bf90df3286e230051884a00573d0bf918fb5ba14061e39efd1d6ba611779f0e3e0cd009a739da586917cb3821a44ca1f1ce45a51fcde800cf827a087cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580b7bbd5c834df6225d1dc92afed86cb
SHA102a310244e61df078ea21106bf3f515eaf7d9be3
SHA2565ec8565e399c635d0ba7e0bf5b31df5d59edeb1cf39b3fe3d7cf2d10bb5da682
SHA51274356d6056ab98be8711626d469f5c86e76255efa0ed34337a7f891eca251f5346a6bf1dff7e7a99d221b6e15167ce00e19206eb48a53f6d420b1a98c8b6fd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9d61e128fbd6696b8a70e0560ef2802
SHA1cd59371a9ce2a58bee98594573ff972be493674c
SHA2560ad3a7fef4156cc90df568ad186442d49636ec700cb3b1d45dbdebb1b00e944e
SHA51227a339ab1c511297829a991ecc890f1a590f5253386ef5521cfec07e62c0acc0ef6a9586f3ac5344e8e46e1bfbeb9c501830795a7edbc3e584e8856533f7e237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a05a28a55525b4e52a5baf63d0864ff5
SHA18486c0196bb85d85382419c3eabb6d9ff241851b
SHA256467b6c3718f5b272b1fa41d4ae105d30525523b3d358b45d967a068abded12b7
SHA5127afdf76ba243f2d10a55c755190691593ae8fbd5cb7517e0ced93b512606d4c0f1da079a8411bf8a79b1aeb5f2450a581e60af2a99a1ed8ddba50dfc7adb7d55
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06