Analysis
-
max time kernel
147s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 15:55
Static task
static1
Behavioral task
behavioral1
Sample
7aa5e8fa80010c59d1f22f2ec3c38714.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7aa5e8fa80010c59d1f22f2ec3c38714.html
Resource
win10v2004-20231215-en
General
-
Target
7aa5e8fa80010c59d1f22f2ec3c38714.html
-
Size
49KB
-
MD5
7aa5e8fa80010c59d1f22f2ec3c38714
-
SHA1
e521d2c2f0396b7125f997fa0e62c62b1a4a16d7
-
SHA256
097ef440922681c8661afa2e038d852f8f0fe0449cbe34ae1d3a5dc48cba4dcf
-
SHA512
aa6e2303ba7a7e520e31452a213c2303a8b6a5bc567a367cd8657716aca6f9f85c1edfaf8a953f4b6c75f8068e12d7b60f2526b41cc8af7d80130a6b665386a3
-
SSDEEP
768:SotWSeev+Chr0AIVtesxgW++2bsbYKLXe:SIW1iRiO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803b408d4339da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409898357" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2876211-A536-11EE-9B28-D6882E0F4692} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d300000000002000000000010660000000100002000000088df3d25b366753ec0994f948bcef0bae972b3edcf03fc3fe689f2cc192fed4a000000000e80000000020000200000008757e86d839448b1b22c6fd67b618b05b8bd54bc2b3fb4ccfd8f6495d1dd954b200000005e5456e95a9552d4448e942b127bbdf3d53da22d8ce470993846c636e44a1c1140000000039dffb58166657b9612016eefe3a20443fbb78560f137edde04e123698afed6cb184b238ab7455308050cbdad063271e41fe4d3c677a63b190294428afcfc21 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1412 2120 iexplore.exe 28 PID 2120 wrote to memory of 1412 2120 iexplore.exe 28 PID 2120 wrote to memory of 1412 2120 iexplore.exe 28 PID 2120 wrote to memory of 1412 2120 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7aa5e8fa80010c59d1f22f2ec3c38714.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fc42798b471625964304adcbb7f7f66
SHA1ecd3f8d9de7f85de2fabf32a0d5a7c9224133ae5
SHA2565a4515ebcab08c129d5e926cfd9b828dc9dddfcae7c2719a6026d1ba444c7b58
SHA5124ff3f7722a28a47d0d6aa576eb8eda775cf9dc6f1198182d019bb63f3631f4c4abdf807cabf4fbdcea71646fe975404054a38ea2c5f47294cced325ac3e32617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56073ad260d825b96240f01f0ae3d60a8
SHA1f3f835cfe5c4ecb343813228525a6053a8e17b9b
SHA2565e2cbbf5515b288ca39c8861feaabd8fce139e3175f8b0aef8b4516ce6222ece
SHA512715681cd2f54fbdd78c8987299434d61bbd22576a9fb1092e5acb1df3b61e57c6e8800dd95b7f00fc5d311d0974eee913e867298b34f33ca2cc81ef8c9c0c0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b334d3b533a93aae403a9e2ae0c21e6
SHA1161f5ce3c11d0a0adbf179f6ece68e5d45f95162
SHA256a9d3bbb53437f5f1f13238324fac11736b21ace1b9e2a34ac50a1439c0e30754
SHA512d261876ed8ce753144229fe396cae44611bb08b02ff7c9c71a077bf4992afcb2bf02411f80544ad37654e01d9b8843d1c3c5fe2fb702c0640dd239094a4aca3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ea4e200ce4a977ead90d719140a7846
SHA11742d248ea34741af6727ccfe0f464cc72eba984
SHA2567daa6a7755fe58996ee4839d7df6c35345a522ff28a1bbde78eaa490a4c1f074
SHA512f3cec3d217bde54a0d0487310a6d133c98c5d86bbdbd004bf0b0cd487812b1bc5fb7f3c82516554efa65c84740b873a07f255d086fbf8a4163887acccdda7f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510442f9d1900af1e130357060c926841
SHA1122af1c95100e252ca1d90e945a71ef9357fc548
SHA256e8cc3774781c18ad106fbcea5dd0c14051ec684ba9a43d31978d2ffde5c61778
SHA512518c1fb1cb11a8c099376c74f21c56ac9770b8064d2e822b9e802a5fd15ee57abf6cf0afd5cdce6f7a234ca1c6e00aaaf847d10a8873a4a927762956f86b65e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fac4d06e32409dcbf04164d8eb1b61b9
SHA1c97a7d035d03bac24e57d32d1d185fc2c1fca70a
SHA25626dfc62fd08679e3f5f18d35d64a8c207deb98cbbb6d5d52cf57357bbb1fdb8d
SHA512a7e93b61b433f3594f15e9520b909f656290707d838e1cef212160f6cb17b283778c9b7b007bfce733ab36a2b56d28a81e3257715b776267c6e874ae34f0353d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc3253cb2e31fc318bcb7b080a4ed2b0
SHA1ad98eb488f4d674b4cc6d1bfd9d5ed84a361c74a
SHA25617270f0e9ed243152f08ede5389770d538d4ed4ae0608320c8b0a828d1c9df58
SHA5120c9dcbb607c3fc2d3002278a5f247af76eea37d4297dcec28f6baa850d3b65d595df0e6ceea92736d930a29ebedb72a36b385f3b540e3fa74b4cd8ac0aac4776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b17ada5355ae0c342d5bf11fafca044
SHA1369535ba8a127f4318a4bfbdde117409238a3f42
SHA2564bf5a09f5f989d253a164fb71d915d99fd80e87eec468b341db925477ecd9fe6
SHA512e1d1de9608f331d01eb9faa16e7ff5d686a4480cfc0f2f85805c4c2f9bd17ffc77c90374a4da4825c0c6ad744cc93dafb371814d1d6c50b5cfc1bcbdd3c18cdf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06