Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
075741c861220156205cba0cc9b20139.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
075741c861220156205cba0cc9b20139.html
Resource
win10v2004-20231215-en
General
-
Target
075741c861220156205cba0cc9b20139.html
-
Size
185KB
-
MD5
075741c861220156205cba0cc9b20139
-
SHA1
023377e47b7ca20a631f1480bc325f728f9bc68a
-
SHA256
a26f158cc1a17a33e04f473a3a2f78926703e3e2ad4062d91ef19059e63d6b11
-
SHA512
2a6e4281699f8c013257327ba215297ed3d621da231fbba0f37d18b9e80a21cc8459da7c5cfd561c677c838229036e670fb026a9de14c32321018a06f3130574
-
SSDEEP
3072:cMbSIFPPTPZPykViMbxj2PhP8gmbzbI0bQUPyPCPNPAX/XcXsXMXmXMXbX0XIXK4:1bSIFtPykViMbxjzgmbzbI0bQJX0XZXd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000004c4b91ce97dbdea7c23204b7bc0a6403849b4cdc1754fddff0156e657a0b2351000000000e8000000002000020000000281def1d96729c61d10d4edac7ccb3a3f38be910659f3f3f5fa9f7af578ae8e6200000004e2ca3247c5205cca5d6fdf06635a9ed52d8d6613d4e2cc4def87d6306e5218a40000000bd7e38be11bb7376a09fd58e8b8a008b09205bcaf26a243387839b99e85555fc44a2579f16639eb3b02bebbecf09f6932bc2ba8217c083c4af33abb863698997 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906e1446443bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410118548" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5735BEE1-A737-11EE-BF8F-CE253106968E} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 3020 2000 iexplore.exe 28 PID 2000 wrote to memory of 3020 2000 iexplore.exe 28 PID 2000 wrote to memory of 3020 2000 iexplore.exe 28 PID 2000 wrote to memory of 3020 2000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\075741c861220156205cba0cc9b20139.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5579aa954ab95d989692ab377e4642435
SHA1b7de078bc291960c04b94f98ca8b8196efc5b064
SHA2565e2c577dadbedaa8f488dd889981be9ab85effb5f774f1e200149bf9fb56afdc
SHA512315c60a4972037be24fdfc34c18b2fa176fcb0285e7d0fedb5009f4a1754f8f88f9899a0d2f3cc8f121da5559a263e49aafa94689c20883ae9842d634b2f4491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502c3ca7286dc3376f4a947a4cd91abd1
SHA13b41e258c75c101a27fe3085be9729c90998d64c
SHA25634865ece0d582824f70a0f11d57136bb060814a04da54442612f2576e976a6e3
SHA5124e898b8a5f7f01b893d97b1f4d4af475c9969c2b530849d1af8e6100cd21b1a7ee55c73fb782d0e9cb2514294b80b71b220eac5689af209da7b65907647ffc68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd9db88a2ca14b157359b490fdb5a03e
SHA17b80134b13da00ce19cff23b722a23658587cc7c
SHA256917916bfb7f95c832f76a84f3d9e33a0a28d2e2bd69f75554a5cfa49fca26962
SHA5122edcedc05c3b93ce8368ca08ef93250ca0944caf9e05567895699f96490fd94dbeaef2112aff7ba1c7322c7fee33558a9ca7252c1e45a2a88d7c712c115fbc7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f03c36295645a88b3b4b53889d8e534
SHA170bc364e0027c591e0c3dff189840e9eef1f7762
SHA256fc138c273e1c48e5106a5e85cd33beb90cba4900b89d87141331fcf3d162244b
SHA5120b52f4238a725b0d284f5a5f230c2ce419b8f5d8858d974a6d7460801baa2ac67ba6c22ee5373564b2db15b2c2705afd9f621ad41cee4845d4974328d44f9fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f7e9a520f317395efe5b8fb5f141bbe
SHA1f428d428877efd8987f8ca2e800111f734c6d86b
SHA256e18c0a4e7e693ce367362bef50a32e378c29e38f586ef51deded3e9e20ff838e
SHA5122d3d0c374aa895d6576f46ac486a52a09c44c65f7287cbef47049d15d1f46742f1720cdb08193a61417a2f512d4b2cceb7175b42d8fbfa4f9cfa483314aea209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50845822928420052efb48b7801f98762
SHA17bd44a17228a191539e2e114ee0ed92e31a18b0e
SHA256c07a8e3bdfd76a95b56854ab6b7b5c6b3630bd7b940509c0b9e22b52ee21e8ad
SHA512578e04f24139b23327261713981cf61a96d52a260234d6f3f77a7e93e92e7f6b4875e716da9816299f5659c64063d63fbd25a949c41507efd6cd450ed5af916d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5642068f39338b7e9e2606bc0e086a179
SHA151e3b1db64cd762fe7b437be483d79d5de1fbe54
SHA256ab9959ce5f7d321d894cb6f1a004dc5481b5569a4a37eac9c70844af256a79e1
SHA512c05afeff689585d420c5a0ce6b0afe20ee930e9b27f0535353ffb652deb9ddda71cc06c23a9bd67966eb679bac23b20400ea9e7753027d63c9a4338350c70db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582905a4b7c792078a230ce7fce4c11f3
SHA153055867de577e9b7a40cc55a6f414567cd3c445
SHA256625ab702423beada31314d4250af7d47ddf528191ad4dfbba643523e31c03708
SHA512a2df96b24f4d7e4099707af113cfd46459fbe51d75c411ba623249a6d88b3ff9c2d863d9723e123f46e5ff944c08b2ac7546b98111c42b0356a3dcef798f5265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5614d3ab59d0e4bc43b588a4f748af53c
SHA13e3f925657e083515d45bc5e9cf043ad876449a0
SHA256fab2a428476580321847b986b92a046e579d697a2702c05605c71270ddfddb88
SHA512f1f5a3dd65ed4df48350756db2368cbc51916306e75c0ef9c3a567b4da6e1dc7d76f0800479fe25a2945c5f59b650e52dd923b64d6ce990f2c7b1ef59c3f2993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5722ab8dce7b67179e3a86548de904cd5
SHA1b78e2c0aa92a288809fe6923df5e586e4e8d1e73
SHA25689a9159559179f4a6c258178b864ebda0ea4b91c623ea58aaa5acccdf13c4240
SHA512e97e8fd10bb50610dca30366c4f977e8530444464b2c114e68e062eab8290ccc3069167077994b644eeceb306e298bc75155c97af76c384a7856e5c41e2cd496
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\cb=gapi[1].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06