Analysis
-
max time kernel
125s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
001f0f5caf5f91b0c84eaaa04cecd372.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
001f0f5caf5f91b0c84eaaa04cecd372.html
Resource
win10v2004-20231215-en
General
-
Target
001f0f5caf5f91b0c84eaaa04cecd372.html
-
Size
3.5MB
-
MD5
001f0f5caf5f91b0c84eaaa04cecd372
-
SHA1
ac3077f92ad2813784050547999443706d461c09
-
SHA256
f7e34aa7a0f3f9cd86183b11ff3701e0b01b26ea4d1f2ab78ce93dbbf9ea3890
-
SHA512
d0444473bf80881d9303348a031382ef803adfc66b1465da1202580bd444f2a1424dfc8fe4babbd53f0a0d60a3fa3e50029add4a7e78de71123e9867833421f0
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NyV:jvpjte4tT6sV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410403902" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000e23f984435094d1a79ca8f734698a9427e894a37f07dd447ac35d6e562094a83000000000e8000000002000020000000e468c4c22e539a1f79478f10ff5469e3e93c5b3f1b21d1a86ff483dc83e3b1e4200000000faaa63106d575ca38d0ea5c5b9f8195c870ebfb301953e488318ce4ec0c657040000000c92bf639b275220960e0293f5aff795dc8e0c35285f1d68aadb6f009c841e3712fb14498443b91f62189bfecb1fbecc95b39ebaa0682dc3bcd6de005bd57de86 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C20E1011-A9CF-11EE-B3B6-D2016227024C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09cdcc5dc3dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2888 2180 iexplore.exe 28 PID 2180 wrote to memory of 2888 2180 iexplore.exe 28 PID 2180 wrote to memory of 2888 2180 iexplore.exe 28 PID 2180 wrote to memory of 2888 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\001f0f5caf5f91b0c84eaaa04cecd372.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574faa22258ddb37fcfd35cad794123aa
SHA1f41579085f58822c4da2162859efa9ff3cd79658
SHA25660d844531ce2b95483bb72fdeefbf40572981197b9b4b75b62da4b0815571b86
SHA512999bc617c30ee86f3e95c3e466021e47aaa1ef6b571cff4fb7d5483b7a8cca4fed92e3f786e7efd12464eeb9b6b6f439317e85f9be6098a798189bc656d96d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c1e229bc221d0d862d5fb7a5368de52
SHA10b0537d47fa2e7cce6b19eb398dbce296861a150
SHA256c9801d58a4b43613af270c5c914cbf664797dc44c53ef28b72cf57fe8130d531
SHA51233a9f476abeb7dd029c57c552c87e01c5337fd456c72f58a97fec300d8f95aff879f31ebbe865560f40f4aa17c06a97fa792036f58f369a7a628edcfb989dc13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593df755d75a24a24269408b793706f69
SHA1181ad7ac0cc4ef96b5c1e4c00697efbc77ca68ff
SHA256cbb6ff102b7d77f34343002dc3abe298694bc22c556f9261deb5cda418b12d07
SHA512126dacf7e45ec1f20ae8b9221bc56cc6379795dcccb16ddc4f8e8c717730da07a687057b34e19b23ff269074bf13a4a3d3ae9a577a609e435c84051da1c81e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fbf4c1d3220452f77e2183e2f0c351b
SHA1f193e7ff38f89be10501e4650a91617b8a78ca4a
SHA256164dff5f39c3ba376933282e5619be915a332fd2a52d3f2407dde85e8440dd25
SHA5124684ff2d47824d0dd151a83bd93cbde36f6f3ebf005f4ce773210f39ec406f675d335a7d76124d5f935d7b26848816553470ac1fb3d7d1d5cbfcc23f8851394d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed317c49b8a30765cb7d4706b2f29661
SHA1faeacc60258e7a8cdcf05917c5a2a8ab17e362ef
SHA256e91302ad0499302eb0dfeff048022b226bdf2852e3159bc98a3e1d7967f8d237
SHA512533055cfbe0d85dc2f3bbb9eb7a66276f5c1ed3058cf58f2d9f7d5b78fe9034661975829905fd1660d29233141e5252b917155b988588401583f66f49ffae6f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51da8d0c6548af61c2bd433e53bf0f709
SHA19af4b0e5187d0375860099df35dc789a3d1fb79e
SHA2569afa68be69fb72698fbc91086382415b9519d46ef07f1d09a63be73626062a6f
SHA5122f5b56e18aaa789f2afdf4d313ce0ffe6561dfdacd5161c3237914b32be428b591700ec7631b52ccf324d1d7701825c2a034682ed71333a5f8334591574e1b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571dd178fb25c3b9a87697325cfd43dc5
SHA1cf06785bb2d106e3e95a7cfe0eac8d11ea28a0cd
SHA256da401f325f5817261d13c5c6ce4ebcdeb0c5e599c5c646b833905115aa4764a2
SHA5121d4821a9755bacefe12585c4acc76496a4e63c781d84da204b8c8ea7183cb2f48ddf36c68fbd16e884aa59c6106c310ec15b8cae7aabba7151d7eebebacce350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50797701727d6f9807d1b3947d87546de
SHA18293c29cfc9e464fce07b8a9ce343b2d1aaa5cb6
SHA2562dfb80b264480ec0c70990ec93b5411a01db31aed8f393cbd78cee6355d4d793
SHA512ae74cef974102c8e014cb2f21540f02a839c39469dcc1d43ae7ef38de347b6c5da0bc17c9aec91473384e74cdd707f762ee1fb04d4db50dda3bc57d784efe97a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec9661f11c817a66fd53f61207bc5363
SHA1f1f37fee09df6d5c9092cf363f23456cef5da098
SHA2568569fbbbc1b49fc6c11e605b92197d6c63dc8251ee7206b1b4ad7b65cf360308
SHA51289a5c4f26ea28753d28dabf27374abaec53955b3ecd44498c94858da86c7d2b47baf1249698ea44042513d591916bf8386e6f4e5a5685218ae0a8997376144fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5535b7ed872a6d6148902bb25f0fe9963
SHA12ae5a0927f41201ba3a33de6f506a6b8c188a985
SHA256761eee06a6731ca623711bdbdb923495b1cb231a04cd92dce2d7b53a221ba881
SHA512587a87c7ba408f5bb20fe0e5b2e6d5a43c59ae16cac3aa00ca6a83d75313542494d3cad1ec3b8c1b712764eee79fa9d551ae36a20224c2c70004a4794ff97fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baec134b2f9d6b79f18bcda5f0470519
SHA194248131739879a08d4f5fb6d69386e7ca6cbf21
SHA25628db390451ab881e1cc43632edfae37b8329bd3e8fc5f1044b97ab87a4f96703
SHA51251da9d8297ade1aea31da59570a558d69707ad2af19733ec4048d72d8dc5b8705111497c5d88e6d53cc6fe52179ab27a318986946343bb2a02084ed9ec673037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bdb618165fc51be83bfc3f589c3ae1b
SHA1126bebb5a4d49ae3de8bbf01840ee54ba9e40e58
SHA256df73da8b385a4c8b89733dfd11a3bb5dc184afdb5c01bce69909cc0642d5df50
SHA512bf6da19d5d1b0be23e0641c078598b18526c32bc39ec669e14aaf250d6a970e6d19bd46ba58f7cf3da3b7aed38709a659d912a5e5d7a1056594913008221edc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7b1867b4538a4dbbfbc5945a2efcea5
SHA1b577858c26cbfeeb9fe0841497b03027ea5477a2
SHA2561c1abc8366e162e52734db46a127301c7a98658bd56d0f71374972744282ecf4
SHA512f7f8746c671da80bb71d7bc6f73d3b1f9727b3151592e6575c2c92daf5c52a4e9e782b53e0c400acb9a815caef5c2f7d1e30d101e735539f8eb48d5a966d1122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3c68e520fad2807e703e6792673c347
SHA1c2228cc6d187bbe313f4cf28cca99a8fafe6c1c5
SHA2565df021b254022dc2b312d610ab62ce21ba698f16fa58b3c07415bdba9fa722fc
SHA5122b2e2f25adeb85a17d442b96f14bf2cd0a9abcbf94a80fb54fb64525ab959a38a6f29a632daee2ce660217630e19fdeb3598b37ca24c514aca3e7c6683dd0923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7a3105a705079202bd8d68a9596c632
SHA143c05031d7e4760dd66902c70fe8a030f81b8499
SHA256c137ec2760e8449023206c8b5e39e088ad6064d73d22c2220b477cecc871bbfe
SHA5127565418cb793c74f2ed2e192d9f03878325ec797523084df7a64ccd4152e3c6cc8bb7c2190738969c3fc4d98ef9cf6c152e0abf6795e4af4d4946ef29bea33ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5439e902c3142ea2ad6f75179b7208591
SHA12ca6a7dcc60cf762ad1e38a18fc1e65cc0f3f40f
SHA256e4f999f2b3ad8cc803b17e5efe2a774862726cb666c4dae0158397e2f3faba9f
SHA512298661c2b7a34094093850b30b495828630e848ee0ecc95a35fdd0bfe26f44cda5b58716de62601ce7fd7ed21c2ce49f7253ca57f4bfaae69911cb141ac74bea
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4K0WM73A\jquery.min[1].js
Filesize83KB
MD52f6b11a7e914718e0290410e85366fe9
SHA169bb69e25ca7d5ef0935317584e6153f3fd9a88c
SHA25605b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
SHA5120d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGM5U0T3\jquery-3.1.1.min[1].js
Filesize84KB
MD5e071abda8fe61194711cfc2ab99fe104
SHA1f647a6d37dc4ca055ced3cf64bbc1f490070acba
SHA25685556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
SHA51253a2b560b20551672fbb0e6e72632d4fd1c7e2dd2ecf7337ebaaab179cb8be7c87e9d803ce7765706bc7fcbcf993c34587cd1237de5a279aea19911d69067b65
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06