Analysis
-
max time kernel
171s -
max time network
177s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 23:27
Static task
static1
Behavioral task
behavioral1
Sample
06e7bb6104d1c3f19ffe2d2abbd71d37.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06e7bb6104d1c3f19ffe2d2abbd71d37.html
Resource
win10v2004-20231215-en
General
-
Target
06e7bb6104d1c3f19ffe2d2abbd71d37.html
-
Size
31KB
-
MD5
06e7bb6104d1c3f19ffe2d2abbd71d37
-
SHA1
af3e133fca86cf70f9f1a3152f7bf375c4cb69ad
-
SHA256
e50a9cfc523aea5ce19726005f6cc06d9b7cab60d85d3e574cedeab0f55424a4
-
SHA512
eaac71ceffb05807d901e0b9a3a3b7a01800ac136fdce962c76209a267871c401ff26c44f218a191196a68c2c33604dc24998355f7ed5e1f07617c4ab4b74fd8
-
SSDEEP
768:8e7m5qWGP7CGYsjTMMLOJjcCgUjyWnZoneMCOvlg3t+KoZEjJECMrlJX9gIi4R+U:H
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D719D9F1-A6E4-11EE-8073-42DF7B237CB2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000007a3f85eaa1f18ca414843811772e2c9a1838e9c9bb73c99a3bd34ee3e4e155b5000000000e8000000002000020000000b0b01b999ee1d9013fac6a82896c42a7f74cba2da088a4e60d69cf90be6a0faf20000000f75f0fab6901edebf23fd7ed9c506eafda68bc6663a438cbed11129d608dc15940000000504578ecac77a7a4c7aa6a4df9ddb3345bfc0bb3f214d3be2015684db2e386eef714cacd7fe6654890162dc8e1c1d33ae2ffcf9d07fac4c2ceaa66ec36e861f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e085eab0f13ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410083106" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2748 2712 iexplore.exe 30 PID 2712 wrote to memory of 2748 2712 iexplore.exe 30 PID 2712 wrote to memory of 2748 2712 iexplore.exe 30 PID 2712 wrote to memory of 2748 2712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06e7bb6104d1c3f19ffe2d2abbd71d37.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575e0de59ee7adc795476c915de1587cb
SHA15b17b682322e826080cacad22fbacebfabfbff1e
SHA256a201b495408d311a2dc98b129fcedacc45b1e061b9fb4e2b4c40b8b2fad48eeb
SHA5128383a73c973664cd06af6f87312168d095dbeed122c0cb346af407e5dd3ca953b551647f2e64e1f0b8d28d84b0a8946b6516df5be3fc667975ba325bb1c7be8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a2848b35a95ca458390cc7e0536d818
SHA1c841d08496f7e3b58519d8ea465859b2ba852ba0
SHA2567d897d04136268e9f1efa0bfae5b08172854ad120ca23e8d118594ec3b2d741d
SHA5121167700625c0f3b4b77e021cbcd3436202b866cf3680e4bf8ad04eddaebdb26923fc9d58cc77376c7a25a0c59f29d704a460ef693637ee1ed575e3aed31dd58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af6695e3eacdda40ec4fcca2fad09c16
SHA1f114492451719e134dbe4097fcbb9048de07c8f3
SHA256282c6a4bf6b1e92debff15ad4909a8e786b3c2e539a212f03393e56540af0436
SHA512abdc6ebe0ef6b35a11172adaaf27bce68326ebe736cb289ee1bc1260f92abdc635dd3ec9aa7cf3cd5dd1e5e354916646dc4b517d2a1ebb699678e032962c237c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523d10170a971e1fad01d63f79488c0f5
SHA11858df12bffe46e267741f60055eab17b0566031
SHA2563ac9df4e1432d28e596a1ab3df1271e4b8e6d1ec5765ddf7a60e9d9f48f1cd16
SHA51239ae08ef4b7b86040a86442394046655a071654264fd13ea0f2ce0d4ae5140f0550824292f1167b72409d41b093f5b6ffb154da0ff3238736f44c8b126dcf2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9bb8b9311a056e3a9658a36b40982a7
SHA19e2dbcc813d9ac5bf371c2c845c84ed2ebcac8fc
SHA256e662e2af9eaa363be8cdfe2a2d224f79c4efa94d9339ea1fad675301edde6ec5
SHA512839df75c6c12b6776ca64576e91c148ad4b69897341668de5622359d70e3a7e10fc288ba15c64577fec1c0dbc4bcae9fba66b2f22c82e55be8b5cbe0b24fe792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5067903a91c369b1ebdd8e11f6727358e
SHA139f8ac0a5a092e8b4315a908b5bd60118582f936
SHA256db2a9a0c2adfc762c0ac870f0705f7f89bba3157713c9fee129743c4cfb51f70
SHA51238c66fe947bdc73bd9407ea11d2f4a2ebae9c23b5ab630ed4cfa1c4010d3be1611f78fa7b87091dade104ecbba31094799fbc034b6fe588bd9a30b500aa9d9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa7252e36b4de1cbcb350e3cabcc63f1
SHA15595cd8d7035556cf31cd354be722d77a8f8f03a
SHA2565539133694ded88f4a1168e1966f853a1ee07fb7d40eeb56ceb3c4607aa5b477
SHA512a5e9f9bfa2370fe2e78bf55b70831f01fbc66252b6be16fb44374645656c340dfe033e941879ae1f0c7c71301a780e4160613b907657c9b7c96a584af6151f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55beedd07f7a47165dcbcd5295ff17608
SHA1a3b09b257f090eb5016ccee0e1e808c2ad7bd6e2
SHA2563f23654ee07bc70fe22f409ffbfe417fb978887ec077b81986710b81c231c045
SHA5123c13704c85ada5fac1f6949c6f887f5d39e531d4f5548733eba34b3c5b9925cae3182ab37d7b07cce9023f56f07ca608f7e9c1ecf1e5e53f4e441288dd4ace12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ea26f7694bdd4dd323824c510132b79
SHA11bab67dccf1a9bfd409bf298b552d8e7b054e282
SHA256105e9c6b6cfca91776251b1d6911cd74ac3515d9d7cf54eb49b56abb4ce82828
SHA5129725e94e7825b1df6481b321bab1c2fc92bdf64c53b4a26f2ba4226763ccf1e69ccdb9238f122f00d9e3b8825a53da4824ac0095e4cdf84557a4cd12fd03fb9d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06