Analysis
-
max time kernel
0s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
fa3a41d9df14ae28530d13e65cc3e067.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fa3a41d9df14ae28530d13e65cc3e067.html
Resource
win10v2004-20231222-en
General
-
Target
fa3a41d9df14ae28530d13e65cc3e067.html
-
Size
7KB
-
MD5
fa3a41d9df14ae28530d13e65cc3e067
-
SHA1
770c78a8a6ce7e1d8602a0b2d86f3ac28e9c793f
-
SHA256
2ab9143d8299b5407e1f078b8f4000b57f4c645b2d89f5f3aaae7e7fe7662765
-
SHA512
49f11764ced35619513439811ce0e0c6c14006a974667d392fe715af51f82d36aa5784dcae415bdea5c935a70ded5688d4505fb6ebe2e0cd5cbd8e143fce5fc4
-
SSDEEP
192:t7CnhUdDw75U5xxrCptmdwufYZn9xlbTmfTm2ICzK:t7CnWk75a/oT7X6LIC+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3F7B741-AF32-11EE-ADCE-5E44E0CFDD1C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2040 2892 iexplore.exe 17 PID 2892 wrote to memory of 2040 2892 iexplore.exe 17 PID 2892 wrote to memory of 2040 2892 iexplore.exe 17 PID 2892 wrote to memory of 2040 2892 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa3a41d9df14ae28530d13e65cc3e067.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51743a63b64ea5a113955e1ee3f5260a0
SHA103d79b72f23f8ce97fc5ba5bafce907e3ce2e1ca
SHA2564f4d408b665cc796e0a74fdb7252510a3bf8c6d50450bc2c421902898f84ebca
SHA512f316af5dcbdc1486086b97c6e8362547e7d7b9fad166ce2cb3b4c5c5177d7c5f8635464c622bca30c839cb05ba3cf381c73efbdc9ba112a85d78cb8152e93a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505fbad475d84f8b8d13bf740c1dd1173
SHA1e127dd6f491ca6c602ec94dd4ece9e7e46cae9bf
SHA256d3abb251008220144a1bb701b5993806bd9cbd933a8ded439ebb01fce515f5c3
SHA51231fae9e9b861523f8ec920990f055bc77e990398df7468f288f8e7b81a9eecd473f312851b7d281db26ec3803bc498a163486e8e9ed554719ff047be9e925d9d