Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
fdde22b708577cc1f21e3bad63ec8972.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fdde22b708577cc1f21e3bad63ec8972.html
Resource
win10v2004-20231215-en
General
-
Target
fdde22b708577cc1f21e3bad63ec8972.html
-
Size
2KB
-
MD5
fdde22b708577cc1f21e3bad63ec8972
-
SHA1
607d8df18258aebc127f8284b96f93c7840f55fe
-
SHA256
dda4f07fa95dafe722a160606655d22e09f4f8001809dfdb5d5846af1d43cb78
-
SHA512
fc9df16b48023463988ce8883ff0e31a68743ff136f60694b062fc44affbc7d2f54134b98db7f16bf93fe7ad43d4e84f22a56412edac25339fefff9eb51d0d31
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B273E2D1-AA54-11EE-9CB1-72CCAFC2F3F6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000f7096096d80a0afd10985fbe48d5c83c3494b0a6c9a5e39e0728a9e16557d49c000000000e80000000020000200000002cb213cb3e1819c3cfed25b1a161909fe72c5d8fd05799f62ac0117e6f11459c20000000ac1cb4dc54c4a654dc71dd44d63013c24a097e5d95ad5429b74aaee1809725894000000064d8c240724d27fa634cae5f4d20d5270dcc5d64d62815fc0d0f611c4234eafad7960128e4859e37f62b408fa913964dead3772cc320bc317a8c3ab1c0bfdb50 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410461003" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0054f486613eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2116 2976 iexplore.exe 28 PID 2976 wrote to memory of 2116 2976 iexplore.exe 28 PID 2976 wrote to memory of 2116 2976 iexplore.exe 28 PID 2976 wrote to memory of 2116 2976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdde22b708577cc1f21e3bad63ec8972.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54f556a455fad96d3850db48867b18af9
SHA106d0998779daa0b5a2edc2ed62267655a1d8df22
SHA256d92c3e486a439f39a6ec6d048bda310704422729d85a51f6d2bf211f91ddc690
SHA5126193cbcb1c8086dec91402cf3e88ecb9f2d8cee1142a8bb4c93b4de973e3974c5b22a28b74ac9d6a6f3343cfb9da76c2e0c6bbda0be941215bc6a2bd0eeca636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f141aa0dcaea67844faabbaebe2c8c1
SHA1f667fe06cc78e045617c641b1745a5905a232cef
SHA2565ad10616e9032eeb17156a021fc769b06c9fbd8a1ab7ca685380c0a8251cf148
SHA512381dca86bf2c04f2c8f267da17fe11854e3c84868a8587da9863bac28e60e5c113aef3c6768f8dbb4a98b7ed95f76e5fb1750580caae86e6aba98fabafc8252a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57001c173dbaed60aea2148dfacb1a7ef
SHA1dc6d25b470ea937670fdc40b5180bf1dbd60de8a
SHA256db94bed83cb517fe6ac29ea482d8b4897ddbf0abb3558cf3e48b049c37eb3075
SHA512ee63d95dca974ed5000134acdb4f9cd24e4a3e98eab54da355ccf7b32ec8cf01dea82e790c918703581f833e20600042b9b8184f72d60373a4f5dc27b0fce4f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca94071944e91194a2b79bfcfa5d4cfc
SHA1ae4d7e5ff40eae009a3c2e68c682d68a7c8b50d5
SHA256db5afd20f0689553a4f02b92636b1321fa8c8dcbf25bf5f88c63a5a7cc86de44
SHA512488b6eb01a9ee54e26b352e726dd46442450b4c1345049ef0162b97186e00ccb802fccdd856b10ce0f76a139e662ae28cc5c6faa436e30e973da717a33d2cadf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5194070eae381f7bedec4c2edb3d03c3a
SHA12db29bf341351e3bfd5dc10b7ed0a0997cb2456b
SHA256ac0d5eefe44b58a119178667e8cd4707eb60345f0c0b87e1c43a63868d85a5e4
SHA512f248b20f6c04b44eda167aa73e64848ffe4e3d392fc93106777aeb7a2df6523e7b03949dee47fdc386296f38cf770b29f4c0c84777cb858203df3d48faeb5f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579cbf93d64c1f7d5c4c0febe30d4055b
SHA1f9f5b5c67b2caf215499a9c3bf615e302461cfe3
SHA25658e9c99a6ff64a1cbb12c8d531e6e1fb05348072affbbc6350563ee2abcfbc29
SHA512ae796026595d5299132b816c35996a8ab3fa672e1e53ee3cb39f29e5ee0c2276363865604a2412591c0dfd744ff11df3ad92f42717cf467b420c88fc3ec88184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5470f168741de6f4e4a9275a76f46e255
SHA1a54b43ecce07376093f8d4ad7e57617e4cc59c39
SHA256c88eaee87eed6012ba8630a3351eda3531fdc4b4c4f2952b6d0abb2944762fd4
SHA512f17cd545d9c5e440ac881bc2bb9c5dda447a182fab90b30ebeda22a2daea1d746401462be009483502141d394052bfca5ac364c27653722169c3aeb9ebae272b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c34a36222246d725f4ff57adeec019c6
SHA152205930b29381d5f3f28f4213f5d784162b50a5
SHA25684e52ceff2465b0241fcc47d302d41a5ae53e8c89cb14a643c715ade53020b20
SHA51226e69bcc1abfd69ad7cf2396772a18f7a3f9992d9569511279b4014bc4a22748ccf1e81d472dba3905bb2d527db965ccee83d5df376af5f534e57245f41f4298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52195b98841427d2561826d8cbd1d70f2
SHA1ba1c0ca5328c6f75b33070cbf5b06e17edf9d996
SHA25612589ad117b8c5615b03d782e45147466b5beec494fa8a3febb106d0b6324cc1
SHA5123cd706a3f64c89506ce07013181e5eeadbd7a22fcc92c4dbe9bc876a51b95bffc0c77e43b856875b89b7df414faa23d4638bccaf337b9480a82b4da57a7f0b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a101f62ab46844ed01540140c562375
SHA1bb992f968631a41342ff7bc361d8a57d07bde75e
SHA2561812ea051f383d8ab6f4598a02a597fda4d3301f3d3426182bdf247eb97f7522
SHA51217ac00aed18198d59e91d21de1a0b22b5f70fe5495041f8930c4912c48a1b19d369655f0bb8b8950a9c3790b81e2bac69f18ca93fd4d86784488955315b25f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5998d16a663118fee0b835d5056ab8513
SHA19728ef773bb86f6b32723a075d29c703b6d4de85
SHA25626bf037e46b343e3248c8bbb30b705435ca36939a692c001e406a219a72291a5
SHA512a83732ded642fd2bb9cf1cae9f08c9923e2bdb9fe9b6ffbd1fc8c88fb6ce94df12a0f58781920ee47c61e0fef1dbac90e04687e079f6cee6d101259cbdbeb006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58506fbae2d83cef07e8230527fc1c6b3
SHA1d93721e5e54d69a7464533c7fae06d715971f77e
SHA256eb333d022a305d24d84e06a2179fdee10f56ee40c4a2d29f3e57e23d8a5b933a
SHA5120932d66541d6be4e1a9e7d3b93a07b7b5482f7ef41af12a6f49ce83a409361900519b99cdf779ccc47eda708d853ac88ad4860e5216147e467481039ab868865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06