Analysis
-
max time kernel
121s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
ff1c85342c6c3b1f84f18e1785646e0e.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ff1c85342c6c3b1f84f18e1785646e0e.html
Resource
win10v2004-20231222-en
General
-
Target
ff1c85342c6c3b1f84f18e1785646e0e.html
-
Size
432B
-
MD5
ff1c85342c6c3b1f84f18e1785646e0e
-
SHA1
0d0763584bfbff74e04fcd7387cfb5b7db701c3b
-
SHA256
f29e7a6a505fd1e239936a98b35c0d91cb1d5cf84adfad5c84ebc702bca2e21c
-
SHA512
66324cdcd2cb83bd75f2d69feae6dd9cd7c9a9010cb738f0c9e1918221bcbc6d514ebaf6767b31951f17b5dee73b50b82656294309016f82e307bb67261af627
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e91786640000000002000000000010660000000100002000000028aa0b7aab12801bd201f855097d0252edbd6cb5a35264cd5ec0153cc3eeb38f000000000e80000000020000200000006a71a99ddcddf3aef59d85c630a5fd135ab813e9da6bde11a9ef588a7e1ef1982000000081a98d3d077713b7901ab55b384baab045e89f792db2adf5e745700dca1e38df40000000b6d952ae2c3299431021b8d596325eb68cce5fc94c74136c9db68307368e7b7fecb7c38a04e4ab52fb0cca88739b394465b684cfdf5a2721cc470a23424ffc23 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411002044" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B85B2E1-AF40-11EE-88ED-46FAA8558A22} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a7953a4d43da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2388 2480 iexplore.exe 28 PID 2480 wrote to memory of 2388 2480 iexplore.exe 28 PID 2480 wrote to memory of 2388 2480 iexplore.exe 28 PID 2480 wrote to memory of 2388 2480 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff1c85342c6c3b1f84f18e1785646e0e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afe32deb14f6f8f7a26be5b60b16c205
SHA120eeed0632f1f783a7c276c121ea0d830f142860
SHA256d794cf87b0d70fdc77a47c36ed4760cdfccf1ed54665fe5f5ba7142acee472d0
SHA5120713f7ed392d72228cce56a8d3857a19bb9d9959279f150498d0f14751020eaf6469ab740552ede3d5f360234096bd1697356b718c1d7115af8efec508b7762e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5888db6892868006541279e99af5fba24
SHA1f8b576a5dfdadf47853f042f611be1c3282fdec0
SHA256adba04e6c712bb0205e3fa8ac0c1c0a3bb99fabf13e66605a75fd54477ecbe7a
SHA5129404d7358f545c44619eeedc356b16e756324a43a7423629b4ceb06b14cff9bd11f9cef0a9b7361e6b484a19bf9f86cebe43a5707b262dae71f36388dd8c79dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e550cf915c6354e764f1d1874b62eb8
SHA11d8fb0ec390bc9d2cb30db74f1fc250155b2f7ea
SHA256cc0f51878048710a230f84240150e78c5eac4d47b08b93d680fd21357d3f381e
SHA512bde6ef0527c407896476331d9ab3b515d01dc044beb3735a8ef9cca85a210c9d77d8c4a6d7f15230de77ea515efb54946ceb64f3b423473aa65d75d50928b632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aae73d29dbc320a2f0ef18c00bf65400
SHA1b0cffc520a8cb464c7e01f380a89e643df729b11
SHA25661966ca2b07c3ec59f79f7d7ab47009aff7a8b12549e95d0f77918f788ed4a71
SHA512b5f7cd32eed93c2f45339c823e13e1460466aabc67c200c87cdd463df0c61d528d40acabcc02a4eabd4324d5149a0ead074882fcb8abdd41252ddc3bfab9c897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507116d17759bfaaead3cabb8503caba8
SHA1478f7d964c529c073c8b946bb6780735cbaa261d
SHA25680f4167709c552de41b51d50586c4ea64a2c66cdab2d9f6412fcff2f6d607f09
SHA5124e73dbebe1ea68a99aede0410920bc6fcf3d967316f40947c68a52b0c44bf6c1dd552accaef356cb47fc6bf6a8ef2b192e123b691f5ed343587857e22a86e68c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5785eec2a1e6c86f769a8a277589be4a4
SHA1c41a471fa64445c3c9153a497a16fa2d044cf8b2
SHA25601f73225e71f65dc811a650a645ffadf47b658cbf9493ec42c9cdbf2970e6bb0
SHA512f9d54c65896e8528bb33601c93e4a0c3c3aeecd7f0bdfeb6bfd7cdeb8e77ea36068a1f536c354b0b12fe730d7de95cab0683000c6d627e51654fe98ff8321667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e4c343479f5c9d670a240f80214a404
SHA12a8d156a1060ab96d3bf3ec9bd833c3e1cdec41d
SHA2567867ba1343012f77f319fb52ce0a7a2c04e33609d1cc78a1ce6066e87d4f0080
SHA5122bc6c31fb09155b2d5134b2ae3ad2b4701cad0727b5af0a9aa9cddf1ad6baea208ce81563f047cd74ad32b9f6c7d02a9c7b520a9d619ef1efee0192d142ce2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58826a9a98a83bf4baa000cdebc7f463b
SHA15872739ac4445a2633248db6d2e32c6e1e82c2c4
SHA2560bcf901b92013de9e81530c8bd3af92b1ac1181f4a65cd74b495879079e20b91
SHA51204afaf51c42417ad7eb4f32ef22bbf28586d13f83ad56bc557704f5955416b69d86f590eadf38641b2c998370a5d1df74562321b7348439156d4f823408f4b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc5aad2c1e535f0470e23417c4f79bbd
SHA1f19b20fa89f6fb1a7d38ad37a827e9a0851e3124
SHA25605ee878680afae681533cb583b692c637c11c16f81d47e5b1e1ee41042ec96d1
SHA51272e20ab9816d3584524e0742d0993f691caebe07ae375aeaeffc3399bb2287d4b16414759144018e16dafab040c8e7ad36f0fd2f9e18bd25e28da39902b98ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d908ef40db56dab312a61078073e86d3
SHA1f787c3df12bc740dad59222b7370cf165c57a649
SHA2569b7220a3ed9ae2d0cca2c099d652473e13f6269fd8f86de4f9499dc8c4c14004
SHA5129c974697a0db2fd246eb49d6db98cc7514190c8cb49e661fce281cdfc2f9618e0b1321ac1475c638b2decaef36b4328cc874441c40d2e6db629b5b8c5947fcbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5549914b6e43e7935d0e28878fef90d64
SHA15e78f53e9458db0129158d6df5558c080c844206
SHA256cc946c3bfbf0088512745f805a79c9e764b850c42953c538388b884c0b8dbd6a
SHA512345658bf61a454f85e6897f39e747c858d6e5bc3733b70385039811b73c0d69edc5091dfc24769c06ef4ff34c1cf8c0a9088a5d873e194e8bc47c412859e946c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf1f328179492130946284e192cd460f
SHA1bc2c876d9a37aa5dd7abd1ed91c18aa6bce1e0ed
SHA25621e45f7780f721497279a7c3b6c0774efe61c1533b4b0e822c724341c97fe5b0
SHA5129dbb2f01c2dbc25948f7be5fbbc0058b774a52cc5ef0d593f400e0c3be89bb7e4528fdb623311d18e2c8ae776da3e2a79518ec1971f78e31ed474ea1fd0990f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e364971c84a68906cf42e1328c21b29
SHA19837920d0fb0a84eb06f942f73e3513ee3e0b239
SHA25669babd85b794799409f42cb6637d0ecd742f725c68d1ce8fdf8ccec7d98fc8fb
SHA51236f169d6616a3064bf68a9c1bf7e6bf5c35c22903c0311e991043d2bf9d455a1c68399544c75a59eb6c40cb8b1025a647dfc76d97609f524605d6c2cf8d799f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc3ff771f14f1630c94c54289b95f3e8
SHA1003d0d872084752558ab8cff5fa667fce086435e
SHA2564b2fea12e520127cf23daea6c52daf8083867d73e2c2f5476100a12ad24d076c
SHA5123913f728b934b8a7c808fadf67ae7446eaed868e7e3b9b8392055b6f901419142fa84c97389c9caa7a3639596547bf1736a63dc7d1be5b01543b6012dc698ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58272119e48338b1582031a219e4aafa1
SHA117f34f9efeb80de5eb9a0ba542134f3f900e684c
SHA256cdd1dad3850bee41cfa6a8191987aac2d3dc7742725ed623651e3263e67b698d
SHA512e3b62f884d5f9bcb970ca8f9b537e19cf13b9c2f3c3dda6f6798db9e9b79d1edc794b1866ad672d48878ab040d1c17716d28a079fba845ed43a8accf6d2e9b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505863f4e5a6b8ac9af88292332626957
SHA16371bf98e227358781f4be66cbb5d48c63a44dff
SHA256d6c4a593e762715c945317967fab02fea97825f5fcb3fe9765f839924512a59b
SHA51295fe15a026a8df68e3f2157bed2cf63edfc6e123602dc22563bb514827a44a1839f495378a2b9e41d9a1007b6e65da2e6e49c8758ed2ef3b453f68c721761489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580244bc73ef45d546181abdef9f84520
SHA11de65060e1fa5844aa812bce73fc3e66eeed02b3
SHA256e9f961dd699d470be789936d03908ac78e634701cc5c58923df380498702d46e
SHA51246b99f4bcdfdbe9bfb6f51c1095ede98967310ceeb08b84fdb6caec7cbc20071af19310123f3b1e8404a75fb679462abecc3e7dd719424d56eb8e937c843ff83
-
Filesize
1KB
MD50ce0c29149443d36d5c5f67ebc449575
SHA1bb892228ceb1a15f395fadde7a8232d4a397ef95
SHA25658dd1f325c28e112e553419308fb0c200ff59dfa0b0a68e8d8d49d3b7cfb8051
SHA5127a7f00a9c6e8c6cdc59acbad79f20aae4690f7f71e9ee7bc35864c5d055f0c53499020176ca8726dd7f6bc03e09fa11a2f780dfc00447d63755b7c7bc2646e72
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YV6H14B0\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06