Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 21:33
Static task
static1
Behavioral task
behavioral1
Sample
f9a737af51991e38293a5a82fb2025d6.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f9a737af51991e38293a5a82fb2025d6.html
Resource
win10v2004-20231215-en
General
-
Target
f9a737af51991e38293a5a82fb2025d6.html
-
Size
18KB
-
MD5
f9a737af51991e38293a5a82fb2025d6
-
SHA1
11584cbd53df398527a85620ba95f742bd49077f
-
SHA256
dd4f084fa39d626869858d4fdf19413d411ad31ef95ddcdc4bdc939823efd0c1
-
SHA512
da41602ad017ca80d0fcdfa3bda25d7dd5e06c547f257aef52713e912059a4a300bb698885cd29d9c4f3e74dc2057531acea6bcc514b490bd9d2eb6d75bfdec1
-
SSDEEP
384:uWiZc/X2BLfJmSOUlBv6ie+gUqN7aaA/WCPGQxr/ctt2V:Uc/XYDJmSOUXvm+2a7PtJ6G
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c8a88d473eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A385AD41-AA3A-11EE-A140-5ABF6C2465D5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000705fd81220e220f9eb598f10e8d90b090fdbf965deff45d468a9bc4f416ed336000000000e8000000002000020000000d119d37b3a087d9ab2c1527c2a6cc5c82b0762a673429b9c011a4fa55831321e2000000056022783640a131e74bfbf977625d91d17aabcef1b700f9130c0308760071073400000006a2471a39fcd439e5bce32640789d2bf60eee701d09bef37e13f256f50046ff2dc99d4aec2b7f9617b7816198e89d8cf40895a18dc21dc504536f9320f774a63 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410449812" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "21" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2660 1712 iexplore.exe 17 PID 1712 wrote to memory of 2660 1712 iexplore.exe 17 PID 1712 wrote to memory of 2660 1712 iexplore.exe 17 PID 1712 wrote to memory of 2660 1712 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9a737af51991e38293a5a82fb2025d6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d99d3f2249d346a7a714f0e7beda9b7a
SHA14fa85c3e1bfdd5b7f8048fbea23178c58de10e8b
SHA2568f524fe26f8bcc79126e97c10cbd25214fa00d4d8961042093cb3248021c7976
SHA5121b481e51e80f6f4ec14d637b45d7cbdcbac9f805fb773a8e67a87ad711f118dc663ad2866305632ebbccfdc4939ed59778a9763b569f366f827f5df8bb8f09fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfea11cb38fa3f44fcb1326e64ad2452
SHA1b6ebbabf8050dae286c18df0e87bead5ce87986f
SHA25649ab609a52e4407e8971beea122e98dc765bcf7f3930e4a2f9ab03d5b4821acb
SHA512ef410fa877aaaa9f2c46964fd1c5b11df915e55cbd7acdcfc743c529f5456b26a05aa987f9e6f52f361c87848d8f2f03dffd31b65d1d448f77c74c76ee9bc2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca86eb99b1f16a7038c49b69ffa558b7
SHA10a84df15b9c60390b0ab1107a543ebf3cc5dc986
SHA2568c048d9cb30780310fa1729242d386969228eeb725dafd4447f3a6af03a2d39b
SHA512a6e247a684a2a35b62d4bb8ace42ad4576531858af2ea9997d6dfc95eaa4667ab3b26a22ce09792dd86c3767a69efe28d8064725c085c7288297a333530153e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5902cc9b3c4b56ac27875af6cd9136d6d
SHA1529751630764520c857b6c1760d306a1953c7802
SHA25636b9d08cecfb7735e2792ef143c8257a5abb68c00c86a3b99a61de1bba35ad5f
SHA5124edea2c1bee096cbc3803aa215c9fb569a365256d47da06d3310debbcea0d15f6fc67a82be6e75ef02d0fd1847a0f888519d6b33b9adb7b3d6ad73b7e498ac00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52559d609e46d7214ad9acdf525fd6197
SHA1b3789fad6be2031faeba2cd098f4bfa98b18fafb
SHA256656b5ad146360eec1936c4bb0440e1e3b9e76566dc9f2a2043e3f18e02b2e950
SHA512a6fda2700a964d0e21f483dd6e86cb2c88e00cfccecf7f32094e36ec9379ea9a843f5368dae198a34e726f1dd083f30f388f6cbbdfb89fff530022f24afa1f26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7b19202f31a4e3f9cb656e10d4fa51c
SHA1c8a0d03f3a5485e36847f39968c8be90903435be
SHA256a0f85aac5d97e4ae2dce65f4652cf8fa02bb6005a5f9fe97fd272a3dce1d9323
SHA5124dbae6be1811d84a2ddb8ad53b8616ed141b6365b13ffd778cadf49255c26bb05d799577503629cef17bef811360dcb2e0f57894285715d2d6560f7119372d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec8029f40f7cc583cf053b1c867e8724
SHA1e4f184fe35f75128dd3318e61317cc134209e245
SHA2565a43b2ef38faad5a4c66805a8b9d1eaa2c7901f72a9caab5463be24640637c6d
SHA51271bb819c51ac82409b8cce401e4b731277aa0c49ce26c8546f3fcfdc2a4d047cea1a86615203300f459ea477753cf6571bbd297804d750280439b724cacb45cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eae1fd560c63df158edf045f21f80fc3
SHA10b59bc9979c930300bc2e25c8d0aba18b89a06d3
SHA256f9444ea5f6b9a64ada6137da5a42beb3a33746d97d7090e92e9ed11ed6bbb4e4
SHA5128983124c3d21fb43e8e988dbe7c0de91a470ddf2cf5e38cf9bf880adae7ec307dbcbe77046d095af8327216a4ad95eaf728a61ed15289ec7bf9bc1771d724e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e7c3ab8414df4d24d63a830ef4ef53a8
SHA10035ebfaf357bd344477f96dce005426ed1ce05c
SHA2561f5bfb7ed657d23152fb34c903562eacfaa951eb3f13e4bd163c38b9d9c45596
SHA512d952a3b799b261f74d4915d143f93e5ee3c5685213c85e2ef93a72df76db56a95703cdff6d8325c5ff46634aa2120a3da96c1d6e361ec34e8d237c0b99bb3e6d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5GOI44UK\recaptcha__en[1].js
Filesize92KB
MD5142508e3281a4ad21aaed8538f31a0f7
SHA1c2429e1d5f3aaa8d78d3d93e954c8234ce5ab4f8
SHA2569b747c4aca20c2ca80f923790483c26a21bdafb6dad938a0f5be1fa97cdf1ad6
SHA512160170eb86418de45687b9d82960290fa3d0de2aeea07a1d2b61ab1bbba6ec9b9cd74b1f184109a9de472b2320d71f0b9b5f1067a665f632dc53eacb3fec50c9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NWJDFRHR\styles__ltr[1].css
Filesize55KB
MD5eb4bc511f79f7a1573b45f5775b3a99b
SHA1d910fb51ad7316aa54f055079374574698e74b35
SHA2567859a62e04b0acb06516eb12454de6673883ecfaeaed6c254659bca7cd59c050
SHA512ec9bdf1c91b6262b183fd23f640eac22016d1f42db631380676ed34b962e01badda91f9cbdfa189b42fe3182a992f1b95a7353af41e41b2d6e1dab17e87637a0