Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
fe8a0d1d16df1dada9abf7b54a495754.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fe8a0d1d16df1dada9abf7b54a495754.html
Resource
win10v2004-20231215-en
General
-
Target
fe8a0d1d16df1dada9abf7b54a495754.html
-
Size
69KB
-
MD5
fe8a0d1d16df1dada9abf7b54a495754
-
SHA1
e80b2ee4f0f2e1489b601b49495a9d5b3ff1cf31
-
SHA256
dcf4958a0e153e60519b5b8539aec8b7515c6d9206495828aa35e5ab1e715d32
-
SHA512
f6b3182c42a72e59be7229e7fbf95966446fe24ad697f2ec53001cac0c0dacafd8c50f039ff34fc6f87a6dad255ebfd806b705bffd15e9230120ab251d47c79f
-
SSDEEP
1536:gQZBCCOdm0IxCV/u0FspYp+MTL0+htFJ4rj0Ltv1qUhyxnSO9unSbFPQLMvaOYSO:gk2I0Ix/0FspYp+MTL0+htFJ4rj0Ltvn
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000006cb27ca1af73cc86a30d9a27e32bd184037c3386bc2e2fa59da7a1fe8d678429000000000e8000000002000020000000b9054060ed790f4d41901626695ed93c1c54d778ff32459791de943be2d4176490000000e6117484efde937aea6cccc6a4ed4c1de43811ddc75c390fdff44b4f050dd21adb12b038cad1451ed286fc308e4a79fef9efc6ac75decd29b193ea256e726eee48f9c4f2a48e349f203a23cdfe823ef2a1fa4ae16d824f0a26ddc9c47dd9da4a69dc4bd579e55e391aa917584380cac1be7d6a1b12c25181e0368448fed778b95cb8621209adec24814a90c2a38dacb440000000a29e1e5cc09c51c0647b75ff10de6ffd2518ee6c45252e57dcf74be4dd4fb547dc4fe1b083207f1442dc69ab954bdf742f0f8f7d6c772b84a5f3ccb4cec0e725 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96382291-AA57-11EE-BD45-D2016227024C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206d8285643eda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410462242" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000c796b4fec0138a8471b008b237ad12d277aca6ed969eef6ea922ae5f47dbfbcd000000000e80000000020000200000006cfeaa776e72d74976aca721051bfd8449b1bc62ac7f80df7bca7a6cf15d44d1200000004d53f3c82a8b2f6dd0054abd0837d5a82c145012d2b42345b2ba5bd758c9f70140000000fa236b8233e1ec1100b38b080b98a99a4849e448d8eb53060bec95cc640aff34da5410300231bd8d9b76bea4d368c5e5e48b3c925632615d6b14fe207ad7dcf2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2104 2516 iexplore.exe 28 PID 2516 wrote to memory of 2104 2516 iexplore.exe 28 PID 2516 wrote to memory of 2104 2516 iexplore.exe 28 PID 2516 wrote to memory of 2104 2516 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe8a0d1d16df1dada9abf7b54a495754.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565f813df9811f87459b2b7daad68fc19
SHA1ab718d9e200e7ff70449eb9023269eed85ccd6ea
SHA256e8ce0e28c227ff382fddc724dd5e931ea918a32c21102c82ecdd80a335903b94
SHA51227a69d643d5ac225a4a3a07b952a047bd1d43772e51442327797dfe8a0fdd3338b9d5b468251572a6508c8b191437b757801ffb8f5cc7830136b77be051511b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50737c9aee090624d0e637a497e417236
SHA18709d68fd7d8434e0bb99b1380c1404cb3081ded
SHA256044f2f4c2fe8ab0ac6ba50cae7d683893e8bd44ba2777a13bbc7ecb63c9a165f
SHA5129d47d90e32408b83939b2629fb699f4c92fae4adc69f63dcccf8246b378b5e8f5a29ef1a57fee31b4b74de13e9981070f9e33e8484b2494c3ef4be65e58b61ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282dc2ec4f0f732cbe79add617e4ca2d
SHA18397f5b66a4945a2f377b42a60f8d1b556910171
SHA2563d6c7e05982305fd4e6c4a433575f045fa56431afe4ee348cb41981548650e22
SHA5120dd7a799b4929063bc5d0ccd04b86a7d2c33fc1a3c12ef388a2bde14a5404fd4ea12fd3cd9599a1c238d268424f9d059091c1d93ee23bbed9bb1a69e490909f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52785cad9f08df23d87b8ef61fb63ea16
SHA145c846c47c9747bc100f92591c1f2a9ef41c0675
SHA2567ce53d433ad0187c106fb97aedcd73b774d5eb8c515d5968cbcf3ee189f932f7
SHA512157244b74d4b360720c7daead8a366778536dfcff84c8762d0d08c809c244148ca12704ec05f91e631803a0359ff61af5f8c31e7f5dd304deea971d4cb9b06e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aa05ba5117d0cd76eaa6c507059192d
SHA14e057638b79ffc948de6f8956b4d46de137969e3
SHA2568c66ef8dc76aa0edbd0abcb8c65e770aa65818a72e3ad7f99a7c41aaaf43f6ec
SHA512233334f85b1259be10a3f0321b78701d4b80df386d5dfd6fd6a3b9d79f47ff55bbd69d57576575434eeef5cd94b10dd10ff57338381d327e45352372924411dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5704a77e9922547969ad6d74d2280897f
SHA18bf43c97d0cf4ac077e8edd227877cc04f5973ee
SHA256d2366b8f48bca6ffb15bcc7eb2ea7a8afea0b40aab6db7ce3fef750144ff127b
SHA5125f52aced47d61b05983981017af7e32288955833be8075e309c408225dca0469287f414934f7336d1655b26336c0effc23280e7f2a2efbbafb748753ee0a2639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583b197db623adccedad925f96f01847e
SHA1f996d863bdcc8243440ecbbdb7b58ce21955a288
SHA25623a8fb8a1140d891b984f3cb523be5a89effbc010a28aa9a82e8894fbd088ef3
SHA51285b50b2bbc41aa843ab366d1381b225cb1f9c612cba6058b592acd777bda8d8f24860440b5da2125e6ffb48f4a36cfa905d44f3090af7984f4878d5e3d62ebf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8be469aa4541d23692bbe45ce56bda3
SHA19e104a695baea2d87ccac7f3fb2610b1f6a974a0
SHA256863b1d28b1f361b1c105a4a351aee11a514dcbcafc62d74003951b3e0c3229b8
SHA5123b1ad731929dc65c32ab4bb850765fb688fadd9369cbb0cd5f575b7250c5a6e00844f2b7481f18ee48e28a92c16034c60503b04427bc228748fe7daf315fbf6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4fd4a4d90822fd5ce6cd08c44213155
SHA115e6ef36d12083557715adf5cb7c1b0714d0e1c1
SHA256d16131758880aba5351ef3465f6b673bf5386652b678de7d01f4997fbf2433b2
SHA5124a0eadfe3218be49973a1a2ef30e3276b71df12d2813ef9574bed7e5a479b4caae2850b07b636aa3893198db6016553cc1c86ae1cc66407f09030ff0ee586e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bcc6411b94b696406223f97165e96b4
SHA1a03cd3bfb46aa35457ac6368b9913593658bc641
SHA2568a8aa6e38060e6ffc777c93f6f468da004c4c2101142bd8973fb37d9c488885e
SHA51281bae0f67f7c4d1290beddcb188d1b4692a03f06736d651e11f048e73cbf2126671c3a7faa1b1c9f92ec0bf6cdd29e8092de6b4c3d408cae3bfe752f5ccb73b1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06