Analysis
-
max time kernel
117s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
05cdda9f74290fdb99b47619b6bca65f.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05cdda9f74290fdb99b47619b6bca65f.html
Resource
win10v2004-20231215-en
General
-
Target
05cdda9f74290fdb99b47619b6bca65f.html
-
Size
9KB
-
MD5
05cdda9f74290fdb99b47619b6bca65f
-
SHA1
adc13953f0f4be44cf7e75e8601ea15b5ede3dc2
-
SHA256
e691570ce2d618f40639c554a40694f767138f76b32991f30e82fa880ee68516
-
SHA512
7189282383b54b4fb8f96ecf8e1e8c77a282cd0234be28ca80a1f85ac1937dba35111621177837d44959ef6e8e54edfd2366314de96c875bfbd935540eb4bce6
-
SSDEEP
192:skw5F//bI70m658Y/cfCGiFhKadnYdexi1UPa5Re8Zw:fw7//K0f5zzG8hPedCk42w
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908322e20c3bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D7FD4C1-A700-11EE-B940-464D43A133DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000c7013ae6608507ebc74d64d533ae7718d66b65f1fa1742cb905ed553bc1e11c8000000000e80000000020000200000005c95cbb15c8c60078e80f7a3370b10ae4909f66f86f89b1eea84eb442d09324f20000000c668b85ae767b0cde78447a570b526fa946616c436046b78503c33d3604290ba40000000ec78611bc11af88ce570cbcfe2b4959352bfb29e5f7d9e1db42b555b014954bd853eb6546403f447190d3e5298e90643cb0242fd1f40d07ed9f4651e10d6fd7a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410094789" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000004fd0ca02704d979419e653178cd25cfa6eaeae6dfbf1e2a432205f27465c695c000000000e8000000002000020000000398acc2aa315cdd81ffc21b10a3b1e5b33b805dbc3be8b426c0d748b7816d5b490000000bc6afda4b9d5e46184655b4c9298876ac1b0603d12219739dd5a84ea3cb281548909746f2ec4f73cd2791f6d621ba3ede1008e5d25d4cdab3c2ab16fc492683286552bb28c2df51e10cd047260b801b43c37bdd56ad4c428fc16596116d88a0d2dd270c4cb3735d3f6bb2b0917af232a8f4ee11703f778a4e416715231d7c6f5d16049a62ecd4aeee0970b9098d9da79400000004c1a4632a249e8be7965f6d5c1ddb8b5da5f723d69bac80c4b4ea8f07ca5d1de22c503bf9d1ed4c9c0761a26064d143d176aad41da6c89e1c81a7d7e7ce10c28 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1980 1936 iexplore.exe 19 PID 1936 wrote to memory of 1980 1936 iexplore.exe 19 PID 1936 wrote to memory of 1980 1936 iexplore.exe 19 PID 1936 wrote to memory of 1980 1936 iexplore.exe 19
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05cdda9f74290fdb99b47619b6bca65f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59436b5a26b997e507c596dbe53f35233
SHA1fb305de14dac94bd7cd5b7b8c16caf509c06bea6
SHA2566993739ee8d3bd9be18b778232cca457b6f10547177a5c92e5e2bd9a533af5e5
SHA5123b48928e01076780a1851af2e28c9399db21a3606d5e9122c050d506758320c14700488a7fb09c34e017b8e45b5a03a23befe1315774c22f3bcc1ea64139f5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548fd25fcb72543b0e3ccf15499970cb8
SHA1f64cf2b5a82e2da3fe02060392f96d21474c48d3
SHA2564a57a0239f334fe69a3c3cf7338e8ec46cf3a3aba75a1ecc2971677fbf3b7ba0
SHA51272c7fb038121de41ecd9ac393f15e2e00535f28ec5a5de1080d5220286b44e63909b127ef0113b4bfe3e551164f92ddfe4acdb7edc037743d61d0ce68c9a1553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532d9944a8799d4fbf89eeb093168c22e
SHA1d9a1df8c2aa559d2639560b4f67c023c2111f952
SHA2566643d113d2392bf2c09c8b8f5a64d431b921add32fc210ae049913b0673b2c38
SHA51220ac942bf216b4ee0424fad4c70e1c22e4ac86cc9c3f29a0c5ed040196a5c05eb464514c65836612ab3800464246c2d89c3b103ae31d020dd5f6d67dc42bc9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c806d000b8e0bf70e1e021a99f6bf9d
SHA1050600700f6a16812a43c663d0fb5d74616f0980
SHA256d104f7170bea9337f45de854b8126408d608f0d9a1f13780d02932bf22080c66
SHA51223bb96dd87100db7b0cabbd593b846c6f944292e068416251123f5b4c86023e2536cd3fb6849e4035ef97d791e9d53a630e391a530c9f0b0e36bf69568678eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5501dbafdec01626f9d3125aee237fe
SHA1269f7bf8b7677a85bb53b5ff7e16afc96715155c
SHA256436fe895868cb0d7aea2ec1f3e76537ba2a98db3e0e4fd3636fdfd458e7835be
SHA5120d807de9a300c63318cf92ce437bffcfcca5796f3edc95ad76ca80ab3915b59d40443157c3f47c17dad85a23ca3a25956db88681b68a1073b847e2b61d225605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc006515496b1f15c03b6204e6ddb1a4
SHA1f61725a44e7beab2d400db03a655c4442684a126
SHA256c234ee421d5a17e847bb000fccc0542e7b375b2ef3087e96b19fe988e7d856eb
SHA5129600ee2a2d060eb03f5e4a1fd871cc318321012bbbffbfd632b8399e75fb2552625ca08e9b79ae166e6caa0c251d2fe6665637f7f4c329c653f5589352f9ff33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509beebcd56f8275daeaeacf1dcb0ac36
SHA1d9e194b66ddf780ba0a561222cc8fec4357db712
SHA2561c1d2524008eee8e803ac23c9b5d213a3529b78398b2b42c35215145f9682376
SHA5120c1d7e9979ce4ea9c142284731eb78f68166c063696749c2f9f590c975d94d6c7ce5e16edfbfff452fdc779f0f574973f9e070d540c03866ae0605f88655f2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef03e7db728befbd4f4aa3d3cc3eb431
SHA1237650b1ab038486c351d1928a844c88c31fa04a
SHA256728c84e079e7550d8edbc9496de508ceba092c988e115d8f3fefda15be9a0b17
SHA512f26b15646b5198ad596d064f1b3e5c8a86f7690e340118b03b511b552e8d059bc4ae4df1a03fffc74ae57faee998fde4e1754e9b1b441bf85046cb9840816b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506c78cd7830ff0ca8e0515b1c5ebfa99
SHA15b5b358d408dbcf27bb5a4f3d266ee5d55755816
SHA25640f9c9c528ebcabe337fc8c3144854f12696905812c870ae27157911b703d791
SHA512a31fd47718c0da27aee5ff45bac29f934e2455cd6183a7f0b2dc89d6276d56bdd4f6c3ab68b880ada6564f9c84b0643913992d0fe245c784da47b8f58aff631e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e624fad444cbc93d6189e7c9dfe6735
SHA14b46bf8b7c6d0a07df1f2e7854344f6282c04311
SHA256de86634adbccd4ee2d08a175aa40d047247c9c576ddfaf43f7c5abcfc3843597
SHA512d0dbc0897cf2d1e4e74dcdd7e5dcba6009a72a11fd72440aa9ffb2d53860136c079e1c486a1194aedf159402c7a85fd4da9d00dd5ae2d98842b7793b47f4ef50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54634bdcaacc91163743a43d520997a54
SHA111a534803c609781b8f78eca106d5412a21e60fb
SHA256436d577ba63ddcb9d5d55382e99868ce717ab42e0f1f3712a0f5b9c603e90763
SHA5126d4a1e962ffb1e362087ab14593da479e2e6dc6c52eea4dce07a0fe4b1a3f1ba418de49d91a5636e5df628238f37b9e1294240ef6d5f2d33960b70e88676c6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558e1c969c5cee977f16c949f0b6ffad6
SHA1291e7f824d24bc64450ae7192e3483c4c07e99ca
SHA2565137bbaf2b2f9c41bcf3120d6c9a86b26b41512046f66cb9046ff18d8f3aec6a
SHA5122497a0566ae7402094b364de68bbba6be54fc29d2cfe6fa4c88cd30b628156c72d9020496f402670339d84b8e9740c3ec32c48f8db27fa6daeec248ce87ecac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511013367f15039e76f36bfca3b16acdd
SHA1c7dce9c441be3d9aa2c4754dc74d848fd2736b42
SHA25614810ec9cdd3aff66b72d1dbac398d6cac72cfc4268889425853a121d256a365
SHA512ed2ef22523b435fc8dfd3c43bce61c081c2a2ab0f40be4c8328d4696f33ac1595769c103ef43a849dbe910551c07244721b4631f7920fea01bc86d7c5e875bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505d7cc8cab4e9e90fb151575c39c077d
SHA1a89bff5e0bfd74befa9611c9ac7d536965abc1da
SHA2569e40129196066317a242f9d066b5993a6b9260616917400ec9fde6458146a4b9
SHA51236da86001d02fa0d7a01242d991c24988eabaa88d09f3793e3c7a7262e9f254d174a6c019f51fcebbd5178a1678f16f5cb4956c77bb99f9dd02eeee1b4a782f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58acdc2c9510bf189919984dc359f0668
SHA1395174e01c663ba58083eee6cd3d98582f263801
SHA25694d3bc3d3c213f9431f488e8f9b9a5c14e62ad7426fb4db511c586dff12e9805
SHA5127893de98ec8911f891de849c4a13173c4ef200e4d5a48e5c1e9175352e80e620fac1e988c0d0987240646caca4f6f48761eb29085d5fb76cbd64309b259b3379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5119b96d96d1e6a0e6490e42903dd0849
SHA1bb6715ebb2e829b6a08b16100d354623858d8c4c
SHA2561ba72f0abed3fb3009a0e06ce4bdf06457df129bddd4b39a1556f2006b000b35
SHA512ba9097e077fcd1d3afe4b603ad2ef638a2a779be4eef68fea143195e1f8fcd5434cb7fc587c00645b2083e82e1c4d5df268ff052f886b2fa0564ffc8292bdfe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe5c4168633767d741b3398fa5eab37e
SHA121a51fe0e087f47159ca7bb1a5294ad5e709f17c
SHA2567d03a918e2a9f908ec5b9542b6d2e6d601765beb8cda5798f04c4def1d3a2dc8
SHA512e06f86cc0cd7bbc773363292d83a6aef4275c7b56d02fd67c8e1c0a4340c0b33eab650040842741ab0dcf5b4341c6f0f7ffe67bc48d5fbd283aa1aa2e6c941d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52749ec666d3c631bbd70a3b39d402633
SHA172b1c3f3c6a14953d71e4e19bfb6a9f7b46916f1
SHA256204773bb4f53c4ae759a23c7d3fc3b89f0f68fad336af77a80dda16080aff3dc
SHA51287d1023858ecc34f538766f2baf1a5ada69da142ac8fb85d9bda1be500542216e7ca382cfde5a3c283c6fa1be6b5f29781ae5a0402735b7a4dd694e54bdc7292
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06