Analysis
-
max time kernel
199s -
max time network
272s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 18:39
Static task
static1
Behavioral task
behavioral1
Sample
00ba30daa8b716c30699f6cd9f05da88.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00ba30daa8b716c30699f6cd9f05da88.html
Resource
win10v2004-20231215-en
General
-
Target
00ba30daa8b716c30699f6cd9f05da88.html
-
Size
101KB
-
MD5
00ba30daa8b716c30699f6cd9f05da88
-
SHA1
5e4e6a3643e83445cd8cbbe69617cd59f45576d4
-
SHA256
cd1f119745c2e46501ba1d659132a98da2236ac7e1eb3e6e06de6164e35191c4
-
SHA512
2d6a1e8da111f04bc7d7d88947188d6bae698784b4e17e8a063fc9ee873eb1f094264bc143d07c6dca47d0a8b1cd50767d26f2614ced833074e2f373e58d625c
-
SSDEEP
3072:razM+6ApByMcSQ76oGqsEgmy9KXYx+UYNmhxN:ra96ApBPTQ76oGT5my9cU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410196163" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a027c007f93bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c1930000000000200000000001066000000010000200000001a7be146d35d6d8a3eb1b3dea96b27aa061f9c4fabb721764e029ed6859642ae000000000e80000000020000200000009a050d8ed1b4ead8e2c1596e883f9208de44b715a60684696765ec295fd369be2000000025af0c9854e26c3afab7113d2c59f9bc90ca497f66cb90e4d2974c65d7246e61400000002019437fcff0729a710d4c32a1af17b8070b8dca74d3a707dd505defe8accbd6871fd56ad2b9aeb6725e94ffca36b769086c707e258604ad2b488b6608ea2120 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1271D310-A7EC-11EE-B311-F6BE0C79E4FA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1148 iexplore.exe 1148 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2948 1148 iexplore.exe 29 PID 1148 wrote to memory of 2948 1148 iexplore.exe 29 PID 1148 wrote to memory of 2948 1148 iexplore.exe 29 PID 1148 wrote to memory of 2948 1148 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00ba30daa8b716c30699f6cd9f05da88.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4e5ff661f5d306d85e149561d1c83c2
SHA1a8ff81fb8c4a46a2eab0778f0f38ad6dafbff6c3
SHA256edf23f2a33cc7175277a11a2aa863f266ab56a2ffdb1fce41ebacd462fe26ed5
SHA512627a23d9a96cc4c5c53f376b5e9f2a66b29727625a6ac5df3e2fef0e028a8350693c572bdbb31df51e9b293fca01d8f13bd354e183724ea9daf86aa9e7e44e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5842458cbece91b24c5681e0ae9b20579
SHA14a1e9c8ba42c95eb945ebcf5515b395343440262
SHA256f8c08cec197b01d16a052ca65638f58d5ccdf8be29c2932bf7025a7448e391b8
SHA5121cb7adcbb11788db282165380411b9bd77ce3da22cf90ddb48db2962916b78cb47946a5cf0f519939cb81d3baac5cb4259676b54b59c81279a34d3a56de77701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ef69b7fe8ec577ca6bf509ff0865fbe
SHA130cd31110222ce40d0dcfb63a4cd13e3be390ea6
SHA256f026f309222de60b825fc7a9d80e773bef349edac0458cad56fe4d5dee79a681
SHA512badc5083430815d0b3fbfe37a9e3832d3b490992d7f7e7c7ca88966349b16fa94932af282a7a52d6532ec95d9fd42a2d38a5f939f6d8ffaf1628198a2e24eecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a79f3c2983f81787837a9e4368efcb1a
SHA1a94f6e724a4c1d2d1ff27e1dc84e9b0c74a29156
SHA2563bf3219a1d289f7013e13c491cc0e6f90b0488ff2e3f496018009ead6934db17
SHA5128d0b31968a381524ba92a401c18d4c07581e76ed0d4542242c042f26c5b80cc8897043af354278ada6a6d5226c91c67cc6c9bf2cb713dc97bf60463f14296d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e8b4cba1ff86a9bcc20ad412c6813b
SHA1095778e4b4756525c1f99d981aa3dd292e35e7df
SHA2563cea4c66ce5feb13c96afc4f503f30a278678e2e9c0f4027dfce70f0a5e077a9
SHA51282fb7a9e0134dc75339414e33ab84d05de9148a656412a59012d5133c098b599ab6157b9c627d63f43a653a1728b8a559081feaeb8a6aa0f666068f2bb158eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eba6f2589e8fdc076a2add3d4aa7738
SHA19b444ec87b1081244f1d9a82f4aee4f6c7b66d72
SHA256a7e55a1bc051285cc31cd1341ca3ca2ff44ab142a5a11f6cbf2fedc8913a2f65
SHA51224c2be255693b52d325ba8453b11f28efbbe03562a4e5d0da9014500f921a405d1e571b81299fac969ed5b268c735a23316e9bb0dbfae271f97b6fa20dacbf72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585edc6a2f913d459c8ca73aba1fdf2b0
SHA13387c985b89ccdf60fc3b66ee1992bf93a15f456
SHA256f72cb70327c1ab7a07e63a28ca6daa0e0aa5af273401eea7889621ba5c22f189
SHA51295daf04c6edcca994a46114de36b158456e2a7bb49b4fbca6442e6b696ad9f528f5ad68afa689f7b5c86da57bca9dad2e2c84ee71e59b43fa31b1ff8bc533499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ff9997a86e9de7a47b999f2a9da6a16
SHA1834b77af78751a74d46b826a7e38162b238d6322
SHA25660b2cfb8a17326de7d2ac81968fb1301f2777f2519462776cc4def7ad057d49f
SHA512e3b2ec69401f275feedfe74f608eeae913b2c8bf4da5230ef8c15c436c9f0e65b7b13c60f706ba6f365f2fcf0b0c581b916f902f180ae688c9ce8562788c9c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeac02d1cb93cf74cb64adc0d7d3781c
SHA1941c2b0c02ce4fd1be6c961106cdb59fac763d01
SHA2563bf667e93432a6c40088e0b585aa024dfa0175c9ef419495c216e45dfdcec9a0
SHA512458751c176d6318815d90d49b4112521775e832702a355ef60310a0fd31f4b69aef3134993600b750997ce6c027e4b39eada79f1824f56af0c4ef0c91e1f5750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5830098b7f5822fad4eb648bc01485bcc
SHA1d7f696fb9bada03686aa9a7bee55cf091e38949b
SHA2563ca04f6ad95ba51847c31af5fe51b25f8a2a719700b48cd41781ead24042f2bc
SHA512dd0dca10e68703c96581e336de9d4f66399bc245fa4e806c6107e9210dd20fec55f5171a6b271ccd861ed4c5113a209fe398b9a474f017af591433b4789fe3e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3b2705bb2d0c36cdb679a39d105be5b
SHA11a817acca2bcb19b75b3412895fbd83472c71631
SHA2569bbaefbf6e67bb14c641c8fd37f6b7b9c159825ca9a7f091758f6dd9cc52aa40
SHA512f76f3ef4ca8af18a4382c19a564f1076f2d7a1a9bdc6f50001995b4d3ef49228d6c4097868fddfab552ce23a7722f780c500f9a1bf686984884fbb0a7e7a5ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5473e4b2027eda8a5f34ac61ed96a16c1
SHA1a8f004fdce344df48cd5530ec527f00a294a5725
SHA256b42b098c51415301a2616a2fa457adaad5158a2f14a4579af43ea244a5f45857
SHA5129e88aa968d605ec6ede7f5eaa0bfbfc53fe3c52dac5e8a5b29476483a8a4146f8b74ee95f55a068d3cc4cb648aeca8cb2928140dbc420e5a5f6d190e09b4722d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f1cff86c5f32a807a4c009ee6fd7510
SHA1d8a800d4a10715be964b81ebb2b3408080958895
SHA256da88535a4e110b1a8658dfcca32d53e47aa9140f4cb460ee70ef2d38827cc591
SHA512fa315b4afffaa3ca97d7d6a36bc33553ad5dd54b30b44ff039376e765c1d6aab58e3d7365017c7eac9ad3e5173e7acb7da9b3cb60bad6ebfa3f376546086d1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3d33ad2d426d3b88e6bbcfc98527939
SHA1cdab89e8680dc5e349dbde8a460752e02cd7ca03
SHA256ae34f837990d120701c63b1b395f6dd4a774fda83a9bcff23896d82b36fe44db
SHA512a6abad8f9c18ccbe4c69fb69825f7714bf5affaed5b664314f68da7df988ee0b21fefe1726fa7292d46279d6082e315014b046984567fe80c6b168e121bd3c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5235b1aad41bc064988ab8f0d0427cdb3
SHA19d5d45163d8643f6b2f225fbf234c3b72a6fadf9
SHA256aa26926bf6bee5b5b12db085e5485cba8c6e1ef7b5bada756d364f7fc2ab1c99
SHA5122535595846fee01d2a0b6273ff4e66da27802a26ec375d69fd92404322bdd6c83efc37b97911f490a7b7c487ed3d2189f71ca85926aa8051b2fa4b49e7f6bde5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5327a380ce2f9dccacfe4f048987703f5
SHA139bf1fd6daea39d80ff928c2f16491ea84a29bc7
SHA256ceefc06b32e31fa33c62fcab8ed4660dd446ca404a07fc8cb884e2470073c833
SHA5122d156562b737de010253ffab3bff60451b834a9f4b233a53d5b104560620fe86ab0c9a19e39678e881a67586bcfcc3bd6f6f40a14191c8c7d39cc9d904c368ed
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1YVWL6AI\cookienotice[1].js
Filesize6KB
MD5a705132a2174f88e196ec3610d68faa8
SHA13bad57a48d973a678fec600d45933010f6edc659
SHA256068ffe90977f2b5b2dc2ef18572166e85281bd0ecb31c4902464b23db54d2568
SHA512e947d33e0e9c5e6516f05e0ea696406e4e09b458f85021bc3a217071ae14879b2251e65aec5d1935ca9af2433d023356298321564e1a41119d41be7c2b2d36d5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CFHPCFFP\55013136-widget_css_bundle[1].css
Filesize29KB
MD5e3f09df1bc175f411d1ec3dfb5afb17b
SHA13994ec3efe3c2447e7bbfdd97bb7e190dd1658f9
SHA2561a2eca9e492e3a21e02dd77ad44d7af45c4091d35ede79e948b7a3f23e5b3617
SHA51216164d66d452d7d343b1902fe5b864ffdee42811ee90952cbfe9efa9847c58c0403f944c8e29db2bc2384ccd516b629cb8765e5e51de37da6efd75962cf82530
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTTGCPI6\cb=gapi[1].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6MCRSFJ\plusone[1].js
Filesize56KB
MD51944af3661da46249991197817b6cd8b
SHA1f952df40ec79fafc7c798f37aff92878977376ed
SHA25663326a1c4e0eddd3501f0a064b06a2708eb0362f3ae934f53145978d3d0799b5
SHA5120bef19b32be337cfba179ed9ce4533a207cfe645d2e5fe0da9fadc7b01c72704fc89749670d1ac48b8d494675bc62ac089fdc4d8495979226f10828225594376
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06