Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 23:49
Static task
static1
Behavioral task
behavioral1
Sample
078582470e171f732a1c202d05fe434c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
078582470e171f732a1c202d05fe434c.html
Resource
win10v2004-20231215-en
General
-
Target
078582470e171f732a1c202d05fe434c.html
-
Size
12KB
-
MD5
078582470e171f732a1c202d05fe434c
-
SHA1
fc5be4914aa644e76b00056fd3d28362d5fe47eb
-
SHA256
5f3a181dd067e100bfd9b6575b1fc79a4d6825485958adf42f4c9a1c04604839
-
SHA512
c2eb705880f6a9749270959b1667e223703084875de3f23017597f364d95537cb02ead2a1d3bb77e4968031c1a9b8078be5734693d943852dbf5299e760bfbc4
-
SSDEEP
384:xy1R1QREDBeVliOrhvU2ee7Io48oXERDY35hCPRrMO77OM0TCtxYLuZ4mXYHbw9h:xy1R1DeVUOdcz+Io4eV77OGz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000004ba301a86bcd205d4010f8761e99735429a5dc54f7c4428e022117b861e46af7000000000e8000000002000020000000788c0ffbe38d96152fa9a1cf47bdd64ffece556a3c304ea1c1cd98409175446d200000004394a31cc6c0545d9f634f49afc664f51caecef02f73212566c9802f69861483400000008db8fd3c093d9404f4c4f2bf3c1cbc94726e738e693bb756dbe3570fe931576fdd5aeff8a8ecd024565f3eb0907edc666ddcb877b1905002fbd645acd9d9847c iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410120749" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{643D85F1-A73C-11EE-BFFC-EAAD54D9E991} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e002193a493bda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1436 iexplore.exe 1436 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1436 wrote to memory of 2144 1436 iexplore.exe 28 PID 1436 wrote to memory of 2144 1436 iexplore.exe 28 PID 1436 wrote to memory of 2144 1436 iexplore.exe 28 PID 1436 wrote to memory of 2144 1436 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\078582470e171f732a1c202d05fe434c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1436 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9122444141763fb137d81eb7a63f88a
SHA18aab65aec6a7d623cdd3bfbe946cf8b23b521ada
SHA256991f8501d249c07e3c1a650aeda18090816cc4d50299526a7bccb5d77c3309e0
SHA51266012227abe46f8e56460c62b06be44fbb17bfb9974022a4a062bc888cafd92bc32ff95c7e18a0c3237291d5d7aa8c2beed44e98e74db7324aefc08e906a127b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545e77275328f4cabe829bd6be316eca5
SHA15ab42f6a2f2bfa4702fb389ea97f5b2f632cc294
SHA2569a1f3508624f6b50cf133a687534c69ccc5eb2c3545d4b4cab9af83728220793
SHA512e05951639a538bf7d18a458db289bea83ac554e471c958a217b85fc9da16529da7337f0deb54bf1997f4cf8e21405e101fd34fb8d1ff3901cc067c80ba805c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564557e7b5a2050346cd2bf119e2fdd1c
SHA1f3e5586ae7ed704e5ac8f61f723d8ce8cd398eab
SHA256411098906c4d2109074c9517bd5e91d09c5cfcc4fb719a2265cdaae55cc7ba85
SHA512f86369181e7c4852aae3f5d67228dfe995b04b74994aa9216fce67180f317012d7c0aa5391e1eafb6e232e4a063fe2a331a1be8a167fad7fa37a68759f148321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee8625611b4e47c2fd2b49894f46b934
SHA14251188d31526c2c9593f896f77795f9087e8bf5
SHA256051d9884c46ef805d3781c35b5898bf5e926503e76e8934733a7f23c1e717de4
SHA51233a380eaf7fdd5ede83fbdbed4402101edcf7ac2118b7c40de321c7cd67415ec3fc812e22ea1f87c9131670f0cd91fe22c5312759e477b031f3d6ebf90c077eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cee44f7e52e1ec1a16ade2c1e4d2b5d
SHA1e4a2656d1d9e666e04be7fc5e06a1a7535db79ba
SHA256686a88ab0256f910a8ad1b9252223e79480a07ea27651b1f50d4e0da0cd8e85d
SHA512c575534636d23e580cb586e38c47a8e9d37c4d06bd53e77d9ec0953377b0660a9ed295055b46b7a47a9cba24709ad6e89be40e16689791b484e7e43f502018d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd5f3d5d586ebe96c2dcf929bfcdda89
SHA154fc19545d289791ee71e5526cbc8cc81f900cb3
SHA25606dc58546417d1efecb670222613cb3408d7e034471b3d785215f2c565327c06
SHA512949605901bc54137c1d19a1ec81ac80d353f921b3c8845810952cbb1496f6819bf8bc905716af321103a60dcc2a0e32b39eaf87f0e2024edbad894930d616ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee70206d2e7e166f2b01f8ec40f293b7
SHA1a1a668b0331028d2841d9517af2c65da947fd84f
SHA256359623b6954610850ee855106237e9185b811c96a138db58a4f1e5c9d23d3d3d
SHA5127e2218b8f43f3af652fcdac3c2181208cdd9af34faa99961d73b4386fa2e0b73a04a9c38301a11fafc4fe230a866030c4ca63e80e89d728410f9f56fb548b3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572893264dacbf6543ff397a8303b59ea
SHA163b49b2e21d5736658eb2eac12962dbcba0f05ed
SHA256162387bd797331689898f3335a9b81848f3e14574f772067ab07c6662f9805bd
SHA51236904f45fc44123b01d0690863a8218f507e2b99068fdb6887e5ca79c744eb64b4dfaf8cae66a9bd279dfc84be675f6b141b0826a1c91c04dd51b5b0b93e9b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f89293bf33699d86243b3ea2019df679
SHA1a9fe906f4593f56063999dc73c1d7f2f0ed7615e
SHA256bfece06b3bda6080f50117aa4639919512f25db55e70f8595ea1394215da7b75
SHA51299b162d6341223896321a837261cfd9976377ae053975634430a7887a8665634853af40f3d99831f416f12126927d9751ed26c8bbf912ed3c9fcfe6505dc635e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b18fd8f39e49fa97ced093a522c4b84
SHA151239c1d2530ba93ac52ba1ecfc47e8fc0a1caa7
SHA256a13eb22aed9ffe25432d43845ac74f91207f6b5c019db9739a786e1f44892861
SHA51242d548339e1b77d56529d71c8a55b1f98b25024fbb137337fd1b877cf7c13e70c92cb75c52dff0e6464d6af3ebe1b88b59930cfd84169abbd51321d50518c786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbfaa0d649a17f6fb32de374a5551be1
SHA1a2e587ded20cc594d74f706ff1f97dab0e0f86c1
SHA256287b11ae0ef83096ba9202a8f56f9dddb06df16ffc245f0439ab6d84634cf50c
SHA5129d8959cd94e09eea0516c315f1c05f1c39c2c126653544bf852ec5987302bf56fdc46e036643ab9697bebdb260b1df602da5d9a32c23797f335a9feb47c0563c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51073ac4f92468891f2c6580ea4da687f
SHA16a14f3906605d7258be0777194b3c581f99ae36f
SHA256b3c6b267ef52c64cdbbc86f449130801b2287909f05e65a7ad14300602ea1ce8
SHA5128f6bff2fa451a0ac31347dea2e79035878e07595a481d0168703d1bd7921b1f29345e44563ed615a1e15da4da32a46056e7992316c4d2d2c5c01c182b9a681c8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06