Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
0519ed4b5cd1172ae00cab1b20926777.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0519ed4b5cd1172ae00cab1b20926777.html
Resource
win10v2004-20231215-en
General
-
Target
0519ed4b5cd1172ae00cab1b20926777.html
-
Size
30KB
-
MD5
0519ed4b5cd1172ae00cab1b20926777
-
SHA1
6a303e8d13a785a3dd910feb1fd43a129146d4de
-
SHA256
b6ebff0e4fb62506d99bc4b163d689a056939997023688ffeb296d57db43b912
-
SHA512
fdd2037e94cbcfecc229884c91fc62a9863dcfdf8585929619d61786e1834f79ded94cf0f45a64c0be7f3d4024b4325200f66c8115b87d7dcf62830fd864647b
-
SSDEEP
192:uW2OChcQyCF55ob5nrMTnUCCzaIKHne/2AnQjxn5Q/hEnQieF7Nnz9zynQOkEntG:8Q/fcdt1RXOH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410068534" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EEB7EF11-A6C2-11EE-BFFC-EAAD54D9E991} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1132 iexplore.exe 1132 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 2432 1132 iexplore.exe 28 PID 1132 wrote to memory of 2432 1132 iexplore.exe 28 PID 1132 wrote to memory of 2432 1132 iexplore.exe 28 PID 1132 wrote to memory of 2432 1132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0519ed4b5cd1172ae00cab1b20926777.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb5f794b85a9dec4ebab5b0038b476d9
SHA1d741a2d39c5d4dffafccce947208527d96a141a4
SHA256705dbbc016b2ec20e0e7647228a2644539c28cf801df83ad7626e209a0815d67
SHA512f415f77b22c6cdd7ecd83f94e658ad77bcef90d2577c81227c2a5cc9562fa8f157021acc9613f6a88f415e3381c02cbf573f8afb3c69fe791b0985951398a94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b30025563c275f41adc103544ab2f776
SHA140228741ecabd8edc35480cd7faa5a38a4f8c1b4
SHA2565223a9bf7053b412a5c24b3e904b8f5020ef7c6308f75420a8352901d88109c9
SHA512ea35d0d9bf4e61d770af813a6a51ccb2408a7881698320950b7eacb850909a372c555ca1d193a36171c24be706fbf5499019fb81ff956bf393a4bc72e1ec0ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f65b4ab56f065763c157dbf92281e91f
SHA17d0b16700c3306b567616950fd66db075a8daadf
SHA2566ad7fd72b5bb710901f28193f5b863f59f1782453aabf94e2b84e90bdaad94f1
SHA51233d76478add90855dc6dd1a710cbb4df6125ff185d7081edef14e9b70b3cd006c40b9b4799238eaae267a2f5659aa17d1153e9f026722d9d985d8f70d8905f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56034d1449d7c0cd357f1dae9d5664c3f
SHA1a7ab4b94b514c1c5fae67f45e873ed39e61f6fa8
SHA256b9fadb27b0617a09ff5820942df2e52a0a2921cd5a5b483bf62a68e674bfd3af
SHA51282fd125d0d7434207da70d7d08ff827782bdf083c601b56150d18a6b7432be506024248016a71bdc1f6987fbfb9b9fd0407e90b80eaffb02dfb10101684233be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5485f9802cbbe4ea84e4434adca8964c5
SHA18411993caedd59d4faf611a69f732d3b393bad8f
SHA2566a66e0bc6a2d4455f98d7eae71a7abff7c440b42b556d22abd50982a861a6ef5
SHA51228d6a457eea7b4b6ac9eea5b963c5c1080b9446f4aa1ab4f5af570c74d11812f4f342359167fac4215bb41d4683ca7ed490718cf5d243ac89f276f8f2b485a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573d4845d1fc615e0c64c2efe821aadb5
SHA10eee72070e76fe03c30af95c831ca7a27fafab1c
SHA256fbfdd99d8785af6adf0f8b5adc3ca6d8dd3d61bd2a2b19e7609225f3d7432cee
SHA5120dddc34de786ae849a71905466a0eb0d9d77ad4e27c6fe1ed153fa0d0ce06188ba8983b24fc6b49e6155d6d0f1e4fe581ec680552528dfa147414ca4c73fc6a2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06