Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
02f3a22207fa611d9f59ee029216b049.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02f3a22207fa611d9f59ee029216b049.html
Resource
win10v2004-20231215-en
General
-
Target
02f3a22207fa611d9f59ee029216b049.html
-
Size
8KB
-
MD5
02f3a22207fa611d9f59ee029216b049
-
SHA1
da1fe030b240d6ea22b9112013231532da5dcec7
-
SHA256
6f88b85ade8ce068108c01e018e326fd9da37a1a7814705a0660167b68745086
-
SHA512
e0bca5c920f3b0c913bf92d265998d06ecd57f297b93735d7038885bdafc44fe47b8ff5d649a06e21a2dba7fee070f035bda9a79de078ec372557d354c4bb810
-
SSDEEP
192:zIu9fe1LarC4irDTna6NRd1qODOXu1Q0qiSH8i:zIu9fe1GC4irnLNRd1qOHQ0qiSf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410051056" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000e3c11ee1be7125873b98e4b7160c8fd9da995a9cc1d99c5f75b7089fcbb35d1b000000000e80000000020000200000008846541c527170627e81c4a8381b4117d8e565eb4a9a1d63478a8d27ade5c01d20000000d83110273885b645230309ed2046169c416cf2872c0029dae2c9172c0b85966d4000000092fc08d01059fc4de9fdee01c29c76a0b3fe7a6e9aad368c87b42382be240983dc77d10f886cd5d86cada9d5fceded635b3656fe567eb557395bf66b4360003c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c051a828a73ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A350E11-A69A-11EE-94C2-56B3956C75C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2144 3000 iexplore.exe 28 PID 3000 wrote to memory of 2144 3000 iexplore.exe 28 PID 3000 wrote to memory of 2144 3000 iexplore.exe 28 PID 3000 wrote to memory of 2144 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02f3a22207fa611d9f59ee029216b049.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e8c9c00b9d979b85ddece56ed0f552f
SHA1e8a12111122acec2a4c0534d2df8a7f4ee944721
SHA256cd41693f462bbd10b25db2e05286790f603762595d4c460f27358c758eb630db
SHA512217c71d918862f1f885829f3ccead4cd80de1f8b0b42c9da29428d89ccd3495626808f2d13a29d5fc7628133d1060f8ea0c27d1d452b1a4def8e2f9982b41316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1360b02c4b0b13beb61bcfffcfd892f
SHA1d804b24971d35b7897c4e3f434c83dce57a5a529
SHA2565396f78605b0a932f4d0cced6572a5906a0645f5cb849ddc1c5d03b4d247591b
SHA512fe9082161aa5c3897877c6ac8506a37734376e7a6d3263efb17b6f4b4873c3a5570913fb711c48e89e915180d46f3d5cf802a8e8ddcbc8d76ce89d7ef002b6fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aba6ec6211ca0418555b996c848e620
SHA13f459eb010c6c44b017f5ce81c5d93342d11128d
SHA256eed592aa4c79576b51bbe370eee0341b5157f1d27d2196bd63c783315b01543a
SHA512d9eded7f8291b71d19602d77ff64574ec5d5450de7edff141a3c9c9369785c9ca0147df2c8b99398364a0d03151459e8404a5e1f00be5c5f55f11c16ac30389d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5787421c2f41d9defc39c0e33d0f4a3f8
SHA1c44541bc1fe773c56fcbf34a435a87fcbb2be29e
SHA256467149c63f98cc67aadadf1c829edd3250ca3ab8d9d067e43ddd7fefdc6ec193
SHA512e4e98aab76ec21e51a631e0e76e3570279e12b5ac08f075e026609dc15c9d6007c51d026c1487efab974f8271b9b5383306bb5951d8295ace967f75d9b3bdb51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f58cbf3a38bf2236fad9046c28291586
SHA1f32810932b9664f4231a45d241febecd2345da4e
SHA2567fee4de71e195cf5374083dff8f22e0c02b31d847365cf82f45d9b2537523291
SHA5125f210c8493fec1975bcd887ff1e024f6900f6df1121c16158a7b166a9f2f59891395d0c19a5a47fe157b857c6d2fe8fcad86bd29343077cf0b097db2ef27bd7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539a7a6666a9faa22d43fb7fc5d9a6a9d
SHA107df932e292a37ccf8912c5a643e954065107a79
SHA2560a94c5658404e6f6bf08fa021b429c27f46c9bf2723c81706d7c105c59d7ed8e
SHA51257119e79c71aace3d6e39289fc229e70635dbc3bff9212eada6141df71258db5bd21ca4b0aac683eb539b01968f8752c2e3e5bccfab53cf0e082fb03b146206d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06