Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
0212a9b45f4dc08607d19b0542803eb2.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0212a9b45f4dc08607d19b0542803eb2.html
Resource
win10v2004-20231215-en
General
-
Target
0212a9b45f4dc08607d19b0542803eb2.html
-
Size
3KB
-
MD5
0212a9b45f4dc08607d19b0542803eb2
-
SHA1
efe925db38db4d66e7043f011bb589665e94c266
-
SHA256
87a3927a9c60e94313e19c55d374a83e6f407b3e96747612bdf94cb0ac298286
-
SHA512
d2742d782a3715c1f325fbfa84856ecc8ba448996ea162212403b5538e6aa11c9b9506dd502ff13830a8f32027e8a4eb8360634d25d172af908aa178a9d4df7a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{028227B1-A68A-11EE-8D93-6A53A263E8F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000cbacdbd5c7bf2fa3c7d5152fb492f172e9fcb6321cb81328dffd6f757883239a000000000e8000000002000020000000d8984da87b4afbf872778076a5b4ba6e23b71d955cee673b8e0ef490afc80b3b90000000ccc38de3cba845b2dcbc676ce1be241d5a732c0eef4f2d86cf3bc15f41ce4e2a78191db8250d0d013a0aaa4cac2d8e68f616b6f27151a536e88556581dfdcf9c4592184eb9c451bff61f04f263c69f45b7397f8f093d726f87fda74f92f653f4eaf332447fa929c51213e53e18e6e27c8296893f66e9870fddab8b46a96487cf1803292948c6d7212c67ce8c67e1ce25400000007e6b8a48c2003cfc96bed1c5660dfb9862d1f3b95bb3aabaec9b24c101c99eac5205564612df5840413b3c0ee2ede4632ce9bdcaf107713cffcfe7f4bae721b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410044086" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000de34c1b783f455f85c8646f97e564153dce92e509c3bbb34fdd63564bb344533000000000e800000000200002000000034ae780b33021816b8f5f3642afcd89a5ecaa8310f35c361822a3c9c7541c06d20000000da6d9a606d0f9f2231c6c8e989d5fd9bd739400f4d0c298ae8afba9c73c6f38e4000000092fdf7ea9bc85f7bf9c8db407e7f231b0f84c2e5c31f82f0f3087f7baeae11488c71c37571a8c0fc4a07b203ee2d4693f1ccb295e6cdb416e80f57fd90b72fac iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a033c0dc963ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1740 2380 iexplore.exe 15 PID 2380 wrote to memory of 1740 2380 iexplore.exe 15 PID 2380 wrote to memory of 1740 2380 iexplore.exe 15 PID 2380 wrote to memory of 1740 2380 iexplore.exe 15
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0212a9b45f4dc08607d19b0542803eb2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dc3951656fcc942e7c74f07e349491f
SHA1b79e5ba21f87e99cae32bbb063130cd8de512e1f
SHA256badbaf010303bb156af840c5205851ab14a44a9600f05a4d4542357ab9d13729
SHA51227b76809ee0445778e599a8299efbb9ac58e049b35802e3805a4d4870394df1fe94f59893f2c0e19795150d249346d87606f23f119e3ebf0c32bd6d80e938f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a34a72d0c115594e06655d5b678554f8
SHA1215140ec46cab742321425999def99afa9b31d94
SHA256fc3325db122697b553ee37afd739eb1d59b788abff803c1f390211816a712484
SHA512077e5198547a00a7796e17ac2f47e2385401c29e866aec6e72edc835cdbe4e176e2d6c0ed19174b52e653e950060491e753c324978a3753c86390682abbfc1f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c40593e9abebc5a6f053950dfe25bd3a
SHA1ab0d34796fbc619a04e05d7334858cd514f856af
SHA2566d71cfeb66396a4428418e117095cff232ff35c96d9dcc98103cb64e3b9a111b
SHA5120804c6ef4e89f336e0ed2493574b4d0ac6fcf058923f4325ac95d7b96be711f128015fdc5c77f18ca371fe3214d948d2e0885fb3642d848bd19cc0d4cc1181ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ae19424a0a89b8d3ba9b7c8d1eed391
SHA13218f058a88b2b7032554fade35648938b0a0ace
SHA256587ce073772486643c0533ce91f18ddbba6d961a270ee972a2b6ee61728f9591
SHA5128acf4a1bd538ac1dbfc4b1029ff393ddc822ad5eabf3ed41c51fdc1659e306c0f30ceae2d309763b047c8f9b3ba32e019722def5ee00fe838dbdd8fc9a26f022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52587607c1129917004ee9a3d79f315d8
SHA190c1cb7523a5e903519863581b9ebe6295eea80a
SHA25663b27ccb76015bfd03ba653ba81fea69a782e7f9429af087da5a9f0b378e0439
SHA5123aaff72afa9f360eaed28dc661024ca45e746694109eda958efa8cd222726c4e87a241604da4ee654221ef622509a68fdd47238ff0f7480580904e6d33de8f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b657107648be7fa8fa65e350ff8438d9
SHA114f2ec998151f177c6a1078f17ace44c0a5a30b5
SHA256f251925ada17c9a72d982f20c9bf752ec57bd1e8bf892f6658cd01618bcdddcd
SHA51282299c603868966d596fccc0616baf242756bfb14ddb09279c397487ae776424e23dc5a25887ed111766c6921afe3d8c24dfc7facadf13dcbe64484630ee219d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba8156b86a2c75192b72e2ecd8b4868a
SHA15a0b0570d924c8032f0c0c6ec3f8137e15f47130
SHA25690627903839a7d82401b97aec80baca5a2a1e3d5d7798fe51b31a8701d933bbf
SHA512915d9cedbb65fff81e6bcdf6dbac392995a2ebfedf5437c6d5fead624e46c969fdb8914693239654afb68c465430355e5fcf58c32c31bf0cd416fa8f808f7ef4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06