Analysis
-
max time kernel
67s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
772f7383c4ddf0d45e6ec042876a2dd4.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
772f7383c4ddf0d45e6ec042876a2dd4.html
Resource
win10v2004-20231222-en
General
-
Target
772f7383c4ddf0d45e6ec042876a2dd4.html
-
Size
21KB
-
MD5
772f7383c4ddf0d45e6ec042876a2dd4
-
SHA1
8209edf254807847b3a378e354062888f74d08c3
-
SHA256
dc933ac456375643c13edf7e80ebc369a576c99ce9db224f915303c76e29cffa
-
SHA512
1472b980f97f0968d9089a038925c323663b772cb5bb46c869acdd4813f0a86ae5812b2087090efd858f3a52cc79d61b586018c7897dde056832d81c78bb2e65
-
SSDEEP
384:Gu6XKLo0lNWsdghKgANbIITHcf2cYIHI8L:dlSW0XL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E9DAC51-ACBB-11EE-86E5-EED0D7A1BF98} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2768 2460 iexplore.exe 17 PID 2460 wrote to memory of 2768 2460 iexplore.exe 17 PID 2460 wrote to memory of 2768 2460 iexplore.exe 17 PID 2460 wrote to memory of 2768 2460 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\772f7383c4ddf0d45e6ec042876a2dd4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5775f25a31056b0ae1a233e85585249d6
SHA133843eb96caa5cad593aee9c12107ce2cd60e8f3
SHA25671f8ebf43fc7d8fed4e72e270f6e752abec62674c520b20db0ea1d7f3415fe42
SHA5123617fc239ec4d2d7fa300ae69372fd492aaab8956e85eadf13cdfb0d84487c843a132ed0916d412890f9bde43b8d9387863cec237fa1c7a897979315092bc71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f87dead53902fc9ac10a681d6a10af6b
SHA1354c8cb087acc5f3025b8cb1a61111120f8e4c5d
SHA256fd36076ba9500b1fbec6ef53515f7e324bfa7a7805ba2ce6d3e8417861e4da6e
SHA51201f14e1419d491259a745019f91c4089ab68d5d69ac32883831038cc51d9c14392fd252d48d51299f7a30ce2e6a01cf1db7e92496045a5f7ec562434d35c1865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f22f44d6ba0ff86e5d50043b1a50f69
SHA12d62db87d5313969f05224ab5498b7cb6867428f
SHA2566af347e68ec2f986ed411e2a2e79b136ce7ea7dd6c018acbd92d2b407b5f0452
SHA5125fbea491d06af7a75d578b34d6791e97da9275433f3dc4eecb9fba3dcefdfe75bc29c458c50552ef485f9d9e32598ec74a8083f6a17e42ee31d2249eb1e52ef2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
95KB
MD525e5c004485abad6ca17d6b6d9692b35
SHA18c32f0cf8c2d005007690cb246d47d1cba187040
SHA2560a8c1e9d08f141719351417d710ff6a389fff056b61bb6455eb9ef0227058d70
SHA51269a7fe2cc9119129853780b1e329cb583c08ac4440872a95e940a5fd30264d1a9c506c470bec3abe4a9fc20a21a53d59609846c31f9b2902b6ce07231520d363