Analysis
-
max time kernel
66s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
f937127df35c945edede19b983a5e904.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f937127df35c945edede19b983a5e904.html
Resource
win10v2004-20231222-en
General
-
Target
f937127df35c945edede19b983a5e904.html
-
Size
106KB
-
MD5
f937127df35c945edede19b983a5e904
-
SHA1
f731d7feacfcb19ce332d39a8e47652df30225ac
-
SHA256
e9225ef67937de13b74054f574d65f670d6f8cdd0d8517942040b1e8644dd29d
-
SHA512
72ea52c30b4e9bcae76c67a92da4c20c553c6a76587138bb96ef900391b16d0c9de60de5087e01725d5658df8fcbd37d858b0282826c0998e7bccc859716d484
-
SSDEEP
3072:SZygigJRUMBPkg7gxtn+FOnWhRTrhR13yazhOUzgPl5M:SZdCl5M
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CCB86E1-AF30-11EE-8459-F62A48C4CCA6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 3068 2928 iexplore.exe 28 PID 2928 wrote to memory of 3068 2928 iexplore.exe 28 PID 2928 wrote to memory of 3068 2928 iexplore.exe 28 PID 2928 wrote to memory of 3068 2928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f937127df35c945edede19b983a5e904.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce4fd209586b60a2e24582acab180ca7
SHA15f91bc4c4c78b27b614d9c9711bdd86998181f11
SHA256409305373363056b5314e8c42f0e2cc7de964763387e8ce73e234a9136ea9546
SHA51290beb72096079b1f40fbf8b7b46ce8722b17fdb2f4e66903a230a64cbbef544f860e424da83fc6c7c8db0c106b3e837408374ffad72f0aa85303c858adc251ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD596d038171c99075bd2bfeffe6e3d79b3
SHA1dfdd620b7d65b3e6516e64fb761cbf993c2586fd
SHA256597c3074485f5b2c8975a8bd0eda4695e8440dd7988cb4477f01d624389b7a49
SHA5125c01755020d44ff65fdbb2d99f6ef205291613f6ed17ec19c475432f1fdc74fec171a57dcb48249f9fa95270c303580b1107300af518984eb8a96b5386350b1b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D0WH5DTY\c[1].js
Filesize113KB
MD5c25fd34b2d79281d556fd8ee89e195de
SHA12afbd212c78e23fc338d4e304485c7c4fdbff3e2
SHA2561cc1b80d4c8d0827137e8ef1d12ca63549848ae4ca3fe3fa361e073bbf01ee9a
SHA5123ac55e8ecd33c69cdb6dbd6a6323726c8b44ec04f6d3fc4329e40d721f47805dcb321dd5ed54634f7b4721fd2f69a6d8686271934e8349e87af4a13eda56b12b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D0WH5DTY\logo[1].js
Filesize9KB
MD58b5e08871e305d7e5a1ca11fe3cdd24f
SHA1799c2474dc053a40d1c2d3b230e0a012e4546b09
SHA25681ca845c7a7ad5c9b166d37e60590125d1e76c83c2dcdb71d0fddfab1309cef0
SHA51211b9232dd5a49ff0c43e32343455191ebab2d1bb0238430af052a36ad62b2b271385884d0a588e74d5a1434b17bc368246856f5e257881b8e2356a822018388a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J4039M3N\logo[1].css
Filesize2KB
MD54b8517168facd773bdb93fd980e8f22f
SHA1c34ac8e5d4ff966d510969e5074b86de1b407e13
SHA2564a8668ff92e78c8f7e2724b301a3dd439265fc76e5b2a5d3c86b7159a21a0d30
SHA512ac6b23d4407d9807b98b0be284bf1093e31f629737b6a2a28becba56e08f360471391e8e56bf78358845c6a60a6ff4ef5703ae5db8ed054806acfb9990508861
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K75Z9QFT\ctm3[1].js
Filesize2KB
MD51f5d6ad43fee747778851c54881e5972
SHA1583fac2435f293d9b507efecfb25d75e9aa488eb
SHA2562a061c19e67283ccf423e5c5c863948cd40bfdb28bfc72ea83e844d06e572d3e
SHA512c384f088e75fbf522f8d039b1d57fdca7dad4a2d023b883336bbdc9ea864a3598ddd9740da008d35b30c2b06348a32a578b997fe60f29e580267335fa35e8c09
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06