Analysis
-
max time kernel
142s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 21:16
Static task
static1
Behavioral task
behavioral1
Sample
f8b1aa41df9cce30d017e33342f632aa.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f8b1aa41df9cce30d017e33342f632aa.html
Resource
win10v2004-20231215-en
General
-
Target
f8b1aa41df9cce30d017e33342f632aa.html
-
Size
18KB
-
MD5
f8b1aa41df9cce30d017e33342f632aa
-
SHA1
eeb5eab5d388e109a7c9e6fa851a159c7085248f
-
SHA256
a2d9a7818b924bc688d2881de54f945b8e23c6ad0bd34f6df359bbdbd604cec4
-
SHA512
8424a571e4c63bd11d4b56fc34df3bab921dcfed74a2fe47a4cab706f80ddf14883f19f1e3fffeac9335fe6c94ecd42769c4bcd7cd98b341d54611bb334511a5
-
SSDEEP
384:oXnNN8ahr1AgdGgs8jMaztTLPAuz68MMv07e:iOK1AgdGgs8jJO8ts7e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E8AD7D1-AF2E-11EE-86C9-CE9B5D0C5DE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000f403f62b81e067f5bbdd3cb2441618006ab44f864827fbf3569339209bf7625c000000000e80000000020000200000001af764488feb47436011aad55af9e3f9e1f2a4bd8ad6df3f743cb2c2bf0109a6200000001dc51b5aa20602984e3a8de9f922d7a533255fceb5cc16e226a59585dcc458c640000000d8aa2e07c5d40e33c8aa6c1ab659fad6d464aec72f754b0a3ad9723df9e9b71c69ec4870e4107057f7a3941e6511119277c5ce5f8315497be121fdd78e18d7fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410994291" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d9db363b43da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2476 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2476 iexplore.exe 2476 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2292 2476 iexplore.exe 28 PID 2476 wrote to memory of 2292 2476 iexplore.exe 28 PID 2476 wrote to memory of 2292 2476 iexplore.exe 28 PID 2476 wrote to memory of 2292 2476 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f8b1aa41df9cce30d017e33342f632aa.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4f12413a18c4b6c5ed02f9b0f08ed1b
SHA14b436e3e95647a6cf957bc43070fc970b183b30c
SHA2567398121a8e033b520f161715cb8060af61402601ea2caed70e36034b857b2ccd
SHA5121d3ae0cb54944bbe81aeaaccdea06d48a13042f4333ef5b457a007b6eb8f4c0df5a151d349d7d71c20771f99e8ca02200ffd818a872ff6aa287be9999a84965c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59013fc260fc6686258b57e3bfcd077c4
SHA10d97461f5c0c2dd775ab94d41d71fab200114601
SHA256fffbf47498ecd4a3347ba0cf46c6d7bb855c9fbe7895081efe3a11037a482054
SHA5124698a2e3294d7a7a8d47977b51a873cd595c30308e35a148995f9a7ac3324ace42fea4e4a0b232afc5b3d26eabf3805ac18b2f513c4931e37bdee38a715db177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581e90afe64a10d9d11f5af42d28dec86
SHA160d2307b548b5fbd3588e36a3a56e874e8268b35
SHA256b060221672a47f6c22944478d7fb24a67370a85c6c61c0f06affd0bfb4e85d1d
SHA5122b8815e6da14a41c15253476d9edce41f8d26233086cff6af7fa302bb273e5ca49d50f2c17edbf3ed54196763f996e34150fd30b79a3d63adb667a950d1aeff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2c7f4e7b067b3ee296a4dd87f1468a0
SHA19df2445ec436ffd82a99eefb29aed0ace13d856d
SHA256122b2d9327898b5b416e9eab2199f74cb19aa0f71ad9ceaaedddbb50539991c0
SHA5128382bae35b2a4de3b695774f57ad6b97e496fb78050346119425c9ea76e99f9a9f07d6f898236dd145082643f78b6d1ca425a9bae1c3eb5f2dcce943a4120410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7aecddcf6577484d324a7e3a9fe9cbd
SHA13976d511e56a04b9e003970c913860173a417bf0
SHA256f9ddfd437678c6f15fbc770b1fd6f8ca86a1d9f329e035033a6ed6de25011fc5
SHA5125a4b0c254550ef89d1a6a89a78cccf60658ce3fd72a58251ade3d52844e82e8136abcdef9a313aa90617d8eff011563f224a0e2fa238513b328d2988ef7c01c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552fb5b60676f82ca010fd9678d587e1e
SHA12bacb80475901492710e718fc52a1384c7178527
SHA256709d9d052f895d357521944771ff6ea2fef399a43f7e3b01ad420ab3f97e1042
SHA512a457061d41be9a14b6f0906633a284e2dfc86845685dd1af9ddf38e59848babd1927bd1bd1840027c86bcd604baaa962013549a7cd865f6a2efba8a59bd42271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dd84470a8502eb534684a0fcd100915
SHA1c9b9791c410d4f97ea0abff930087f06830d5454
SHA2567e7c8ddeda45dcdb3464d8021e94aa334eb80ce102309b5530606a8b517257f0
SHA512956554e86c0e2c584a473e1db84dd3f306e2bd304d311f8b6650680c34e37ee9c4e34d0d2596a801852c4d0123eb772684382f8daabfa6466c1a7e0224e55be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594b0b5e35ad540828d3177ce68bca5dc
SHA18e131778b613c59337cf3711ba1048e8e6651af3
SHA256fa8a6a2d1d6dabed8ab8cc5b358d00fdc3d5b36d054aa19819714a97f1065413
SHA512de5e6066697b669c80231c3f75126b7e409194b1b1ba09c02bbbc07f9bd14cd83c4aa76f7b1b48fa0c7d7d4678fc3ac5e60c09a40a370a3131a6a19aa8e8d53a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5621872c3a28f24c99077bb6a1d7a3fe7
SHA1d07878e964e822c81b702affab391f1f98d52798
SHA25668274bb7c567d7c4f70235e3e1dc41f4dfaa92fde9bbb7bed546bcfd22912cc1
SHA512d82fbe8d4e94fea428f9de73b5d3c56981c64bf97c9a3e819bca77961d1d8f1497c99006ad31fdfd9d419d57a8c1629c07748ece31a6d3883fb73cd4f192e7f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52395eab5d87cee74d4ca88d3acc4cc04
SHA181fb52918aafbad0f38648c4ccedf52a16bb65e7
SHA256a2cae74c66f7f179a4b0bb4ade4e02ef87461e4e0889066a5a42f1ddedec194c
SHA512b9e5abd3296d0e3b9b661b76202e356f6cfd03ae9134453cf12a77bcb116f2931821352320f087023f567673d01bfd713717d3f1e3f25b23aebeab2fb40d76e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5369dbeb02c56571f96adf3e02a49fa52
SHA161419b736bdd2f28d2067e0e8b714ec57c940b1c
SHA2561f4ba1ac117d6ba5f2e71eb889894504d114d940da17c466dfd9cc1dfd4e5183
SHA512508e62d808e5437e92273bd8eb85638e42077726b6bb1a66bca77f39d4384d188baeabb480eea88f8eed6725420d6a4c826ce17786b7630854a9a12f0ec09edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eae0e8483f0001c28443314c953f31b7
SHA13ec4ef7b4b956eaa37290ee529e20a10e0a25110
SHA256f2a9dbd0af97255d39370184dc819ec5e99e4e355cd55b6d761172f45b56a316
SHA51276523e1f982063516fedd324518aea16bcc967d0d09babbcd1fe8ae261f857b80180f64b44888324b8b7ff37b7d1ed30c77b84bfa52eafd4fdd3e91cd6330b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c68a314b9ebf2baf4eab4aaa37a90d7
SHA1c5ce2fc1053269e383e467632766edc8ff7df346
SHA25648321aa43fbbb7be6a99ec3d01ce2307a526d7495390f24bf6c3d19dc36b9de6
SHA512477fb9bb5ce5aefae47b9ed3880e7509f94898aaf56b7532d78f752e03cb5167ba7fa40e8bbca1a2d7b50ca8b0f9db5c0cec004fe718d8c1932ca2327e81cfd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c938becc90b14035861385ee4a113fb5
SHA15653abbe6eeae3b867ef7b5ee0dda245e15680cb
SHA25648a60ff93093d6e3b10c95d0bb77fec4a59e024faa9bf6b2a2724532e938152e
SHA512fc186830d517ad253acfcda23a57e9fd96b3bb0ef4eb2c6160bab96c82996d01866b5aee3ae0c583a421c0f9c30f83d63e4a8e03482fb4db9fa415282b0f05b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a5f90031adeddbc276122305f04d86f
SHA14b11e9cf40d4938233d71169df3d900704be3fbe
SHA2562ef73f724a3d596b2f1105e2235ebb46b0c0484973dbaf391f47c11695e6e340
SHA512874b35db8b3c2318561b3078842cd034f991f0a2f9c71d5749ca4ded3b2bff1c4511ea61bcf0ec3f0aa8ea77474dd43bc8915a44890b71ef372f6e6a3093bf24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566465501d817a4965a6277ecc49818ef
SHA18d813187812f01eee1b3b66c8b252a0a6fb44fb6
SHA2565539f2cf830a8aa9eb0fbb619fe3020c4712fded6b33596b788b3073f7576712
SHA512cc66dd116091c25f69b6ab3ef7a6b403c26aedee1fbe038a9ce698afdc83f5449d917b3720009a6bc00bb4a8fe7b69cae8c4141330ed4e859d849c479bb80af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e2b861f2505f19d00fd404f0edb5f13
SHA19ba4d78d2f4aeb8a379fc610d7184c8e33920907
SHA2562c9ec5a54eba8ad4dd5302bbcbe0bf6c09fe879b817715ccd9934f59bb86b067
SHA5129ea1e3b85d66392435d174e07ad5dab8272acce3b87cbcb98d906f96333c10cbf4f4404eacf2f491e92d402498541e33fe7709296a3948c5b3739bf37c26b817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f949f4311281f450e07e89be4f4d175
SHA1320dcefac84e16fd4b71b8400ea051d5cc3ec805
SHA2567995cc12df41792b09c6b764316854eb8a28c85e6a58569dfb4bbbb7e41542c4
SHA512bf9b8ae0e560c56ef7b449d00b70ebcf1fbbecc40c345c734f1d97e0e1c5f0c4c4055b374d943b9c54ff0ad11d3152e2db91ebda1be5916a37c56313b7be9cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e54ed23531354bad37af49aed69cfe4
SHA12c62f706f0d340e1c585034e71cd2ad5ad136a82
SHA256d55e80698b425b105a50f845f959f108640c9dd9bc96793eedb42daa6d5735de
SHA5125f0a212e7ba39fd0e736aaed8e88814ba974cc1e5a87a6fab5b797847c953ab1bbeb26ac184192dd5bfff79c5b7ac281f7115b78c161af7a94aaf49acfa02caf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06