Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
06c40309aba52bb02d5e1aeac80e06c7.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06c40309aba52bb02d5e1aeac80e06c7.html
Resource
win10v2004-20231215-en
General
-
Target
06c40309aba52bb02d5e1aeac80e06c7.html
-
Size
68KB
-
MD5
06c40309aba52bb02d5e1aeac80e06c7
-
SHA1
31f0724992af7db0b0b88fd1eb7d29fd994e9026
-
SHA256
d1ae9a1d852a03c4b669968094f6946b85eac416fa55b9b945d89d083f87ff9e
-
SHA512
a08a46f723df32bb13704f23159d49aa7f3b7206b9828eaf158931e0a3d09e22fa8e48ee1184969198bde04ee7809e6425a0029e2a5b52156f70acc6156e754d
-
SSDEEP
1536:SThiUJwGx8BUwg8zOah5Xgx8wDctqvLINRxbBdGW2PFbevCnZ0elUsv:SThiUJwGx8BUwg8zqcpBdGWEjnZ0Tsv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000509a5120f24fc8cc8e13c3328f62429cdb94883d31948e413ee4d04ca6af305e000000000e8000000002000020000000e8f2fed9ba8e58026a177ff4c11f4ce262e8473ccc35a0683b2940bc2415af2e20000000e677704e377109dd1827a84c50019cea961ee702401d3f2ea9d94e6a9c5d133340000000d9a85298e5473dff34391e2737b992c28ef32cffee3ca9ff1ddcb9b899b0215960dae28f55496d09489bb51b2bb9c8194bdb11a8b93caa1fc2e480f5b2f9f70f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10927731-A6E2-11EE-B928-4AE60EE50717} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410081911" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a77df9ee3ada01 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1856 iexplore.exe 1856 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2764 1856 iexplore.exe 28 PID 1856 wrote to memory of 2764 1856 iexplore.exe 28 PID 1856 wrote to memory of 2764 1856 iexplore.exe 28 PID 1856 wrote to memory of 2764 1856 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06c40309aba52bb02d5e1aeac80e06c7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee715a29e26e39609e2f1c0dad63729e
SHA1e50630073638098e6d0f350c4f7e1f9b57cc0552
SHA2566a5dff54084c481b7e6affc8b96655656156eb9e8baf9e336ff9144ca6a09fe5
SHA512653b86cbb39e099de00f0a4acba687993df9587d8d99fdee8e474c4937c7c65ef5cad068fc1ff697c3abed0c9a5f2453f0b79d0eb6251bb0eaf7382109069d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a70ff8fe568ab88a63d2bd0dae2fee69
SHA137c28adea4b2022d933a7758c9e7acb401956ac7
SHA256bd352a652eb8d45561a58945d84889b6385e9096f7fe6d3dbc8c26993b22eae5
SHA512f2dbf0db78ed2547d15e548c9cac6ea45c327692f66d045716b3a475cf6768f6d31bf1fdf823d79a9d8397062df6426c0d05c0d31224a14a63c6edbc048a9875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba914052e79de6e6dc6d38c3d35bf974
SHA18f26d1a82f57cf83184917598046ebbd62a00a6f
SHA2568cda49fbddbf9a86e2439808f327d0a1484a8f2b123c3edc14d5ce300480ecc0
SHA51272e08e4d96cc50c023453abec3768cb982525074f9d3f70ff98057061f2059a1516d0c774a1be438736dff25e12fcb25df26ea5278e3f6db3c0d5a72be9e2327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5504fb458bd7752c198b9507c0ca721c4
SHA1bca7f0c416fb37222be9d47e336db3a5f75e07ed
SHA256c0f441a23c1d447c0404e4e95f47638c536763fa5555a977620e5b7435d4b0b5
SHA51233da6090e48e9e18e3f4fb5f31713c6ac2d32c2f8e95be6551316a8375095f04cee897c1c257ff55239866873c8f913e095e563c07e7b0440ffc53f735d4c3e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bf71b38a7353a014c2fdf26412f6aca
SHA1673aa5be277f8844672b78149a7b8e741f712c0e
SHA256584126785a4842b2e7a230fef162298a6b240a5550cc8bd1882b7cfdc3d1d534
SHA512f9f6949e0a040604bd3952df378e9b9ec4b3ad2f721d9bc3e5646de445e9031633fed2e99bd47433ac88dda63d93d69505a3a30c810b2fb807f6ea8051268e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4f94dc9ed9c4c60bd463e9962c1b929
SHA1e53b830a9a57afd8c7561c94a8cfde91689c015d
SHA2565bbb1d65c227fdfa096ab41ff69ba7cb03d9e7936f4034fcb2aa697737973156
SHA512ae2c22eeac331a447d31abc4128842e4879cd717c6bfe52f6e798e7fa3b410583e27e5cb6fd056e861fcdcfd97d36271ef2030cf652cf138e09e66ff8681d945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fb15da292dc38ca451b0e28227776b7
SHA132b9c98915069ed8f7acb20149d87f7df908468b
SHA256da55ae5fc8ef52f88f734c0fc2364cb49e13f0c28d3324d0becceddcf3b57b97
SHA512481f39aff2c89acfbb5c0bb77c6a6ad7d14708497d67000c63a586b3469750c5e787bb03f9aafd6e2668323d84a35a5796c72df964269708ae143ce823122a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bedbf0d0275f321ee88580e0a6abcaef
SHA18625f61312e86814fdd3ab0b35f80fb5fe88e738
SHA256ca29e949fc910ac68cc47a8c5b9c8aac3c31a98af9a1ba786602f1ac62f79b35
SHA512c5ec2fa6df985ee4155a01e99923c6efc142fd3ef92e3afae9e3443b21d40bc3aa15148da844ef5b9e97cc36550390355ea93708cfaf6d7d4231ef08452e1746
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06