Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
05c5aed5649bb7384902c488e4b5421f.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05c5aed5649bb7384902c488e4b5421f.html
Resource
win10v2004-20231215-en
General
-
Target
05c5aed5649bb7384902c488e4b5421f.html
-
Size
21KB
-
MD5
05c5aed5649bb7384902c488e4b5421f
-
SHA1
2f0b9d84813b40ad5a58191c59434a4fac26e4f5
-
SHA256
406d8b28cdf15628b9b2034e1f1eed45966bfee2c4439aaa749e5189bd607239
-
SHA512
c79fee15023a884b807e81a591a459567eff41e61e7b9fe9792a3ce9aa0d40c2b27605714ff30e13275d7e55c2b3a9370851309b167236c51ee2de20644c2d1a
-
SSDEEP
384:uBHgIprA7cyg7HBUcrSrPprutG7GJxMx8yxqx3FJhHlU+jz:u1Ts6vGehH2+jz
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ed1d390c3bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5ED14B71-A6FF-11EE-ADCE-5E44E0CFDD1C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410094493" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000049dae651a733239bfdb138fe6fbf4ffff566cd2bd5ccb262ea1e6d8af9556493000000000e80000000020000200000002ce2f9939fbe70592006fb92e4ec46f8d7b879138ada882b4d061e2ce94a107920000000f98ebea84d93c354f04da895086f2d9ae90623a72c261ea69c31f87e8612b1aa400000009aac1fa14d4ad057c14d1890e7d33c7db1a0d8f367a48907bb4447923ac289e81ef4624681b43c63bab19005e438e0225c18886046a97ba49fe6903074b72f5c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2052 2864 iexplore.exe 28 PID 2864 wrote to memory of 2052 2864 iexplore.exe 28 PID 2864 wrote to memory of 2052 2864 iexplore.exe 28 PID 2864 wrote to memory of 2052 2864 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05c5aed5649bb7384902c488e4b5421f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
889B
MD53e455215095192e1b75d379fb187298a
SHA1b1bc968bd4f49d622aa89a81f2150152a41d829c
SHA256ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99
SHA51254ba004d5435e8b10531431c392ed99776120d363808137de7eb59030463f863cadd02bdf918f596b6d20964b31725c2363cd7601799caa9360a1c36fe819fbd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58d58fe1180740078263ab255005f18e5
SHA153495133bf86b5dc2203c991b65685b812d38f6c
SHA25610400d599477f3dc7bfe24aac9765c5dd9b87b6058a167caa49ba20d8b324171
SHA5127f0455fd4b925331e98be8ab21eb629c8484dabb201cb5f4cdef39858e165e135ab21fa3c30e7bee34de3d89118a982588a3ad442a7d99714c8527542b316cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe855d15d7d10fab5d92a83f9a4ab32d
SHA1690feb7af9a27015c6e5b0fcadbf7d826fa5066d
SHA2564e2e73eed15943fb46ed9d47038a035b6e2ea1de391d88c3bf4bf98445836dd7
SHA5127f488ca9ee0d0de802cc61135cd730673d4edaf14756514894a35b16182dd9486c14e44e2ef7b01364e6467bd7a8532a8cc7c614913f5ef378569091788d84de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cf1a3f7205e25d83a455e747c3ecd59
SHA1fdb01acf384dca2dac96c274e2d3098cf8c131c8
SHA2567aaee5f382ccd2c732335d6a2e388654c06dcf3cd21ddc5c9c5c93912cfe30eb
SHA512b65996c7df665328c87217b7a81fa00f3d51d5901774cdf3cd60e03f0fba02b9a8d5285f6a8cc492a007d80020ad9dc63ef088eaaeb2c6663bf28d94b953fc70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfbff1500d9d603628608f47aa2e5fb3
SHA133de443d89a79515121e7b3dd11c18e5277bb2ee
SHA25620affe4ba7c7271cdfbb319ae5d2ce407dc6cadde6404cd26c559c4578953e8a
SHA5129c53cfc8e64b01ed5c9e6e7374996ec9263c4ed13262449fd9bc14bdde561add5dcb4ada1224716d3ecce70767d237f548c373c638f3cebc42463f34da48d3ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bd41550cd97370c2e6f92cbfc34cdcb
SHA11b708f80de40cde6bdfcb3ec112504065cb6c0da
SHA256ef07d1d3e5277228f6def8bd70131cd55519cf4ade96feacae5c9cc663fefafe
SHA512c955ec18cce2761f9b25de0d88834e341f73fd0453175fa665ce448320d97fc7ec10a5786bc6c8984c51e60717338dbb8a0ca3f48492e1ee818c220653824063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505a2f4dbad786ba5a055354628af7055
SHA1af0684d96b752acc221f65429a7eeee5808d77b2
SHA256a70bc521119630adc378a72afb8a167d81bf95f22a1841c2cf5c6d892ffd8dc0
SHA512d56f3f9c0e689e6b0f181816c49bfeff4d1427b2e3dcf9ecd316b802506cb5c91ed72c1daa583cd368e1cb828763dd3d9dfc28962dc6200243ec776a56a1f353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cf2611d1c6cbd376a9098c540ddd3e4
SHA1558c8a0ab4a609d0530dd701592237094baf1710
SHA256eff20bea99427ffd7cf349df9c419ee97abbc65b9588fb231f121ddb6a9aa9b8
SHA51217d221aa80b8d041240f7fbadf40206bf951bc5dbc4002e5b07ba215f0ab08e4cc72f48b1c8d3fc3987d9f026e1287ed5c6f0c549f74f1dc16379fc845976250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be7af0ac834a540afeab00234281d94b
SHA1a7b5f0b657309781a06ce4c5684f42134f16a922
SHA256c9a5833e91a8a12e586257e892004107447b6544d3ff6fb62cc554620226f965
SHA5120fc61810a442696dbf8c0cf48936a9349bd030ba1e5a2ecf33db6adc94cc003e6606b3c66d0397c05cb8e404a7f68b8c63b5732bb0e522ee99d39e7b75aa7c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51ea8230650a1b59b90223b8ca2d5ef9b
SHA1ed52e2d0d1d6abec9eb8b3b9d6dc408383c6126f
SHA2562fb4e3568d2bbe3e92ec96514856ddfabdeacd07e36443ae1cbdb1c3ce6c4bc1
SHA512b842b0bc80018d308197fabee95a2aba6546bf7658e17f28cdb97a3e9b9c0e436a521425515b20023a566f243d858c981927f39a47ae286c2ff88eaaa2691d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06