Analysis
-
max time kernel
15s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
fa146f6fd8ce81233055cff49562da47.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fa146f6fd8ce81233055cff49562da47.html
Resource
win10v2004-20231215-en
General
-
Target
fa146f6fd8ce81233055cff49562da47.html
-
Size
196KB
-
MD5
fa146f6fd8ce81233055cff49562da47
-
SHA1
aa6fa9afeeb4ad6d1e6c8aca55b8011dcd560a95
-
SHA256
ba8375762e4aeeb7d066e9e82e516be75eb65671b71ed6068df88c9098d9f9c5
-
SHA512
7f622d75514093c07e71c2506669641779e2253a9c5d518eeca47b6a7d076ad1c96cf30d17d727abd4176620342b26709adafcfe434ce77e5116ba90a36a1083
-
SSDEEP
1536:Po05JEwYJQ72XR9Gth+088wdv770yc9RqsZqXu1b:PoEEwsQCXRI/n8V0yc9RqsZsu1b
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CEC0251-AA3D-11EE-A3D4-6E556AB52A45} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2276 2532 iexplore.exe 28 PID 2532 wrote to memory of 2276 2532 iexplore.exe 28 PID 2532 wrote to memory of 2276 2532 iexplore.exe 28 PID 2532 wrote to memory of 2276 2532 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa146f6fd8ce81233055cff49562da47.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5322105a098a9fcf69914b75c1f8eb858
SHA1cfafc4604ade9024f35bd650f01bc862142fed51
SHA256f2533d697dbbf044c461653837d614c18dfefd73e5285e4fd9b20006c8c2414b
SHA51248754906bb69a08ab36c817c8c9fda620821cecac50e3c401bbdc2d2d9e975ab5118cd2452094c2a20c6bc95376d3541c31931b88327d89a819deb6eb8396c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_C7CF4FA7BCF717E50C9341D69112D7D7
Filesize472B
MD5bbb63d31467a1b02d920220843db23de
SHA1845c032fad697efd34a2979ffbbd3f01fadbfeb9
SHA256ffb3b637011abcef32dc580875e7839c47f407980f0bab52b7897171d08fa808
SHA51294de5989f35e72f37032f8975aeb138258e815a4751de34bc7432fa2575d22759ad78b1b52d8f992811e6fa2035efee6821f2a496b1e144fcac02531892f21c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5dabe023e48de807ed2c164e2c0383747
SHA1a98b56fd5b37af8ff1cd648fbba4be7763e4e370
SHA2563a7d4178a9a2eef4298d6759e8e29506e8d0f8de5be3a26fe6b92b96337f69ba
SHA512489ac4c80f08b6af496c18596b45a4eaedaf56145786d8f39a199e27e5d339315996e4a921f7692af35ff0b9107e0e8b57d34e3da35ab3c4c5a79585f067b7a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b47bb6560eab9595fe3d5f7941b1b77
SHA12088c72aee0ef1b38e5e21b0fdb297aecfd50eed
SHA25664a161143c09c782a7ffe3513ba4e9c3c88f47b89cec6e3e83c4e0f013f50af5
SHA512c53880315557f1a2fcc46865d48c16852d2cfc247c34c00518b3ad86f644af2e6586aee79c9cb88848d6ec6deb40244c72493825c9e37a8712893784e2b82441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dd6557bccc73ac190093d1777d6a910
SHA1a8a220f7ed2bf219dd36e7fb08c2064844aa16c3
SHA2568207555221cca82e1d94696563d545bdd8ddf89df0a0f0ebe10d077cf68c9a60
SHA512ada476cb3268c430636fa2a851865bfaf5082fe6be22b6263ee16ee9071516f9e1c3091124a83e1a13f2cfd82fb8f8fa4fe01ae27a9c2235f715da26cc0f798d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5325ba82ec2a8829590fc48fd392e2f3c
SHA1a382b46e58b4e7d78c7a03af36e8a3445fa845bf
SHA2565d42ebf6ece1bdaa2eadf9e9cd12b8ae62502ca8e8477142b1ad3697d2019fd3
SHA512405e1ceb7f3eb3653435fe8fb4e8122266e95f3febe048ef019dffa422009f672a4392760936ca070a3e402158e343eebbab5d7720f6270d6f1f987428a13bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a17dbd9dbe07f27b629c1593ecb9e556
SHA1a3cc15989228a821f02dd3273de99a1f7266a3f4
SHA256b41db4a22499bb1717aa858c6f2e8170aee2ad5a251dcea5608d4ddef70c15e9
SHA512ca1a8685dd33843e90b214b957aadc3f503672bd12bdd4c066ffe57be788ffe0e812b3de979a4aa3c0e7440ada84410b4e26541a46314c22db2a85703423d111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_C7CF4FA7BCF717E50C9341D69112D7D7
Filesize402B
MD521a4e7ee3f2d25aa2b74a1a32a0f79ae
SHA1db191b285eb0f0e5d05c1fcc6fdfca7ac00756d5
SHA2565b6847bd60a02abcf2a6b3a99210306e8bb72b0d38b9734bb272751d646a79a5
SHA5120e9b2a320c58817fae07cb34a621536e68fe63a705d6de4fdb6781083ba7f2f649d50aee3376e7c5a2df81337032ef4303eb8706936151c51d7c0faed3bf0656
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFLWQ602\cb=gapi[1].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFTKP12M\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06