Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
ff39ddd911f503384a5d29993fd5d1f4.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ff39ddd911f503384a5d29993fd5d1f4.html
Resource
win10v2004-20231215-en
General
-
Target
ff39ddd911f503384a5d29993fd5d1f4.html
-
Size
12KB
-
MD5
ff39ddd911f503384a5d29993fd5d1f4
-
SHA1
e68bcd527a210b3c35a8af9124143e3e7ef04364
-
SHA256
e623385040a4190005a8b7d46f5480fc6ab8b53fa46d9a98a2cc2587d995badc
-
SHA512
fe9fafb7aa5dd2f7b7303b4d6bddb188c2f25344a550d3f551ee2f9edaf7f3a4735b1de38f165c69861ff855df4b42c9abe39640c9d17ad2ff0a22b18e51878e
-
SSDEEP
384:sElIcu9VLjiB/gYsBjZTnRsiJG0LaguLZ:qYgh9taxLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0E57131-AF40-11EE-97FC-EE5B2FF970AA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411002190" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2696 2424 iexplore.exe 28 PID 2424 wrote to memory of 2696 2424 iexplore.exe 28 PID 2424 wrote to memory of 2696 2424 iexplore.exe 28 PID 2424 wrote to memory of 2696 2424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff39ddd911f503384a5d29993fd5d1f4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5907e8cef976f2ac2edd7d8bfc7c80e19
SHA169982369ac3bb7758ff4372fb27a764bcd1f7de7
SHA2560a3b23ae808e11e3d129960cb187c5ef0622c08567a9051acf54be1b41ae0bb0
SHA512be2dabfcfc3b2bf6da308c2a6a84ab46e3556ad59fed819cbdd4ec29a52cb136eb41bb846e2aeeb6ea339f1bfc07e6deb3100a290207ed96ffa44161053ed906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdf13a28bb39af5ae7119e60ad243ff1
SHA100eb38884501ac4a41d999cc416ff49fa869db86
SHA256fd1cb6cc3a26cacccb035873a464331d401955faf8ffa7a95bf40b872ec2b0f2
SHA512630987a625c012d30dd6ef2f8b578ea1ea918b9c9c3045520981ad30926b7d1de1c1c9495a06adf3f4c86868054ad3a0a81085032b51df1869ec24ba13ca38f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c154ff3ae22d46e62eda4570e0361fb
SHA1c71b6a7442801b3db5063e0baca02b24462fd803
SHA256ea0c4cab5eca2854f12f6a1bf973a2eb8677c75519e6dd6a208cc9a2a453f8f9
SHA512697ac3c4c3bad4fe47ef759fe0a96affc42c748c7a5e6d09c46bbf1bf9006fcd1e5f6a7d260d17d53dfc922a50dfb6807dd50b7d54be45e058b02a69ebe8b1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e86d5d27c89cc1a1d209d9315addbba
SHA1b16cbb69216257130aee009b89bf366cb701dd63
SHA256a25451d9fede42c96ea36e311e6f05966f96f9ca58289f33200f85481a8c95f2
SHA512043b27f733033a216eebfd4ab1d1e3c4c759799e461ba881b34e721394b1c8e5972d5b7a1b19e8f4528f745aa003ba959abbbd2662e2fb70321b4cf3b43628cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b18b25e798ff16f671c7d7261f83d491
SHA1dc5863b31273580091441d408c4dc2f9ca7f9bc7
SHA2564bcf3b14573b439f9a4957f443844195551e71d9cbbb98b08be498a8febc8435
SHA5122f477dd3dba021479f707f91a934e84bbf38c7232ccc16860b98c3118841e3af065093fa3535c9680080b63cf6ff02e16387930b9f91377a99e40d4852ccdcee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e86837ce18c7d622f55e0b6a99e7a80
SHA1e4f234b5eea021e4dc7a417543cd0be907b87f81
SHA256eaf6b7102e0e7e131eb2d9ab1398d4f8ee6577c9422a2c08c54f46cc86d11b32
SHA5121b971e19522aa8908838e675264a59f2b784fca447bbb40c7ea5305a872c2eae17c1a81ba8205f2d45cb675d9d450ffe62681e99c1af36fd4b20b29a866ad479
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06