Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
0307fa9102a4edbf3849d81a884032b4.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0307fa9102a4edbf3849d81a884032b4.html
Resource
win10v2004-20231215-en
General
-
Target
0307fa9102a4edbf3849d81a884032b4.html
-
Size
13KB
-
MD5
0307fa9102a4edbf3849d81a884032b4
-
SHA1
9e1253b170b653aff0fe4852ea59b5054e58a5e2
-
SHA256
4d7f24e0d5132ab2a914cdbe8ce97b544f52e2bfbd565b2e7cf31befdfeac224
-
SHA512
eee1a32406ff43032a27cbf7f8ae02bd5a60d9309a0f37bd356fdb987167dd4c72f0aad9a743bd11c1a552e6d15a64d95cd2d82d720df5d7cc165d50ddbd8e5d
-
SSDEEP
384:kbpx1rK6VDJSu3knDXLx7O1OexCCMIVJCk4fFFAsXkbPd7biDXz:Af1rK6VDJ90nDXLx7qxCCMI/CvfFFAsn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000e437e4d02622d688d495c81236f3661b8a06edd8ed4dc435a0d3deb66a1d3c38000000000e8000000002000020000000c1b65da0c8f4bf61da6d32eabade61059031f827246aacf638a247c7d081ea6d2000000005f6bc76af3db880962f5ed8f31c8fd71a816c88024e8b6cfa11e7d2907c27dd40000000839a6c11dd9bfa24bb6009bd8862486afb4357aa02ca74d1d69b8a42734dc47039a9c5d6125a6dcc198b0511d0c7bfbe88465d8e3ff2881ae5ac08911997c02b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F5DAD81-A69B-11EE-86E5-EED0D7A1BF98} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000b0258f66d55d418ba1170105126fad9b0ad0dcb1492b0219d5e7ad2c27586e2b000000000e8000000002000020000000d592b95f75dbd26e061b501a0c5565f88786ef9079013fec850bc8f01c9cd473900000005f5e4913b6657279b813958f8bedc26b970c2c3de148d3debc4641cf5d4068e072cb04a384fe30481864a4cb12e21dd2462e9ab3a337c1baa600f3e81b994b68dc1b9ce5930730478a19b2be0b5c0c8018207574ab7e39fb5b2a33632682d7a5a89dbcff0af5d3ae86f9939d05add618fb891c5b36fe28db5922e6c2d7845c77f158eee24904783aa5fb763e4880a14140000000579955c8f33a38cb08ea18dcc8e7baf32a28f2256b5de1a0529500169bc932ee3ff253bf2a03db6ff5d209fc07294dbef3bb584279739ae3eb1148efd8ee729e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410051570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a3b44aa83ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1980 iexplore.exe 1980 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2712 1980 iexplore.exe 28 PID 1980 wrote to memory of 2712 1980 iexplore.exe 28 PID 1980 wrote to memory of 2712 1980 iexplore.exe 28 PID 1980 wrote to memory of 2712 1980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0307fa9102a4edbf3849d81a884032b4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e9d757ad32975b8e653bb56192baa4a
SHA1cb1e618c30f56d49925f2f629c938faded3f188f
SHA2565f50df710c95ab94a231fb0577773e9f4d987e46a0bf50c8559495d593c8a564
SHA5124f0b5c0b3ed1374edf6b2ebac677b1821e21a1be1ee9d0fcca1847de85c4ecef1691c11b4c9f7b95adab8713fcaa8be54907153fc19109c6fa90fa621022cf38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db043ab15e248525a3c3215fdbd0738a
SHA1091ccbe284e20c1740a74e8d804f12edb0505575
SHA256fa9022c56993e375b0797bca821822b05930edc154839cefbbe8f7798266939a
SHA5128453b3c48b2dde2d498b738344e25702b9ef3362e410df729b1d28cb098a1ecb95497c00a9c280040c01c0d7cb28beea07456302080078421f97da41c3ecdfa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c11206edcf6eb85b184b402f77b57405
SHA15824cbd059a49ae06a0ee6a3b65574f3c5ebe6d5
SHA2562e99d5d29e65d3fe0860cfbfc6c1c17fe3db33505a4070a5f0879887372d69e3
SHA5127aba78819c0e2d7c63dccec85d2d813e9863ca562acc7ae64aaee2917f5507548b119ee534c5c4bca5d05b6b765b90f5545c050a31c5c1a8593cf601f7242f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519d624b8ed6a9f3d6d69a7e0e7015024
SHA1535eb581658c511b725fd7c12e6413cc051fa79c
SHA2563aca16f923954eec4b091efc9775e714cd649fc38da4b72dee6dd5e326fb6c10
SHA5129230664dc8cf79ac8ad754f723fdb07b014937c43f8d079a36e90eef37c8aac68c8cae4f9945a05ea9e45bbe01d4a210e9e6f4fd27ec1e929f36c9e40761a3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b2f5f6e7b876676ac3f365795b8d27
SHA1194d000b0e6be1b5d7d401725e96298399ff3e93
SHA25622404bf9b387a49c39d9125c2d4c02320434bcd183607e60cc28c923f81a417f
SHA5125cb959a4f4952662ada05472e51aa665d427e78b3cf37c8a2b58eec956abac898fd0b939736f62136bb78e833bd6c0a774cfe77d21b66dfcb72b216753a84b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dd41d284e9882abe5e5aa6c0bbc46ff
SHA1f9d9275b9b438587f6783650e830b0b0ee5e7594
SHA256a12f4c02daf833db1a1ad4f46c044f622f1052912d7faf6e9bdabd6a4b2da468
SHA512a5a02a172f2313d01301ba6c240a2cc1b07c2f12af0d4c92dde44569ec9394e0262c5d95dcfea8f9a5ba190e8c4d7f33be4b3386b92991e89e6aaf5d9b7b4cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de9a211cb63f9cb7c766a32f6a0d57f4
SHA16b80b0f543402ab061baa8c76f755e88b2aec3af
SHA256079024feb5d4473301090508c0f48258a26def8651805d391ad9478cc300b982
SHA512c536265c1bb52f955c05b628461720c1337fb1cd1546859a4e295fe068add7dc9d888b3e4c09654d2175eb49d766b611cffdbe653c11d30c73cff811198065c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d20d1d6be2b0b1cf416c89a1cd28666
SHA137ef0f9d92c5efa07d78b70841b0951e510bc8a9
SHA256c9339dfcfc290f53c5aba90a6ff71e35320d480cb4915099466d452684376ebf
SHA512da3247c84c4916769b21e2f419af46142ad5a68d138c158027b17d0b0d898544fd21d368e7701d5a6d2b5b1a024824372aee270525f2c04e47577772fbd2038c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d4dd1bd4e66bef54eacc10f1832325a
SHA129a5ab9e686c4313c0498cca38b68832bc1ddfc7
SHA2563bc3baa25d6308c821e4c2b07ced77b3dac1667e1e13c61b1b3955f47012a6ee
SHA5120f4ba63ebd2811bf5908b2e613816960ce58001a2a6324e26a5016b96b39ce3fd7f40515951c5444cc31da07c27abb10075582cc49d0fa19fa0dae9216693dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59493e3bde176372b026a1491641c5ee1
SHA17a753085e5c46ad7274f29fa2c653f7faded4b86
SHA256d8075c6781ed476f0d1b202261f7c4ad0c038b3c7b1165f2d20579d43bdcaf7c
SHA51299d1258e6dc4b5ea563274e736b764d7fdd3d9363502010aa606f9285ade2aa632e8f7bd1a5854262f8fcbe125f33d7c1cfcd5ca92ee6dfb91dc6fc5be4ab49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a28228a5b7e11426860592389addee0f
SHA172c528f54d691a6482a6a8df6f3819bc56de99ed
SHA256bf8c8bb1d802f4d83244c829409f81bf66b06734fc6815a7883db864ad5d73ac
SHA512eadedd60e16cf8555076de4c97e513f861bea2d430dfb228ca4f590c7cdcb0fca34f2087fa9fefd9db0ca812a773ab154bdced30f6175133713a46b417faa0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51687ceaa234f1accb34c14159beb9728
SHA1cf75891c37701974e7d35b0830f97251485266eb
SHA2563a082df1972284bdb0a7cfa54478ce3c871a41fc0fdc6eb777e6874288e7d2b6
SHA51233fc3270a7d47237998294b636a5bb9f01dd850c5b2ba1d00901b7fba5add56737f073e9f1cb0cfd38406fcea9e9786f921bb722e23bc91a6b16d1d9a9c65c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55423cac96ee33ace4f7194d9a18d43da
SHA1f823ef75ce2c58fa4cd47803b756bbec7e588476
SHA2566e7c00330a38df2b5e01eb592667b1ce4396713fe1637ffb0a7396f785d2811f
SHA51210a6da8a0ffc97a6115cbce486d9a0682f45db67009d02a8a6f9c8872c7ae131532083a56c4b9235133a53e1b7899ae19f3523c232881d367f797c6f02b3aa73
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06