Analysis
-
max time kernel
121s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
02219f92450e661896b4e2ada4450b4c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02219f92450e661896b4e2ada4450b4c.html
Resource
win10v2004-20231215-en
General
-
Target
02219f92450e661896b4e2ada4450b4c.html
-
Size
240KB
-
MD5
02219f92450e661896b4e2ada4450b4c
-
SHA1
24218b16886c5540f63c5b83efcb54bb151aef14
-
SHA256
deea8fd510775b1f9cf50c808519757a3c918afd4356e19cc41c98f459e134ac
-
SHA512
8e9af5f2b255f2ecfb0ab2eb1bc207eb229801c89122203946723d1dfccd9993b6867f0a0fba4fb7d36d1d8a5d5d44fa4b4e21070a7f952a5a131617d8dd88cb
-
SSDEEP
3072:YyfkMY+BES09JXAnyrZalI+YSyfkMY+BES09JXAnyrZalI+YQ:VsMYod+X3oI+YXsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000f7515b56ac3c83d1b102519f3a9bd77ad10a00929515132f3ffd6a08c4502960000000000e800000000200002000000064bfe6a1572ee05b26ee1e556031d4963259bf19cd3e155cb0e9dc201838525b20000000ac934a7056f508b93f4a2f5671019f96c3f682ea889122d010ba453a068d956f40000000e78783cc9682c73e1ed89d948a998218a68a5cc869f474004b61814ee4d20b2f86b769a675d5af9b74923cb4d49729a5b0f1615b65a055837c6c7a8e5de32425 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0752e39a23ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61FE9421-A695-11EE-BB9C-CE9B5D0C5DE4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410048974" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2364 2084 iexplore.exe 28 PID 2084 wrote to memory of 2364 2084 iexplore.exe 28 PID 2084 wrote to memory of 2364 2084 iexplore.exe 28 PID 2084 wrote to memory of 2364 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02219f92450e661896b4e2ada4450b4c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7ace0cb964137b77b3b1382a8eb56f2
SHA14c713e44beb0ba2cf3d79baf4ec9233c930bdf9a
SHA256b18499c47399b484807a500d1f2e1ff9e7744fb7b05677a20ddd39067ef8662e
SHA5129b6f2a58e293d2bf217584a91b62f1548ed29f9fca1a5c29cc38f47d57555cdb0dafd5005a8eb29ccf9cde8bbd4f8b0e28337dc732f112e46140196868dc1d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc5a2a8ddab15fd1979321c8ca37c914
SHA1de1c91079b8f3be968462fdd9951dc20f41d6cec
SHA256a1dcb938960bf4dbc8b052747bd706d8a08bf334cf5fb71deb92eefd20f56080
SHA5124ac037e8f262d2211a8a3d4edd2e9e6a230b4f6dcd75466f1ea6f35a903f69bf251e1110289c82480e129e368a932215f506dc6d8b6f8e5e7a45c6231e1f6cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cf01c9b19e763076254a32aa57f3ca0
SHA1b54e2b863e141edfe49a41d4135008a96649a026
SHA256bfc85599b16fff78f9d32b46741d9edf1455c287b9860facaec7b5c1bf8cd90c
SHA5124cca60d37dfdc6392316e0548f2af433d6b25fce2cbed76002f66f30b4142905774d0ac7ffd36baf56369cc723acb4b2bc8d78f74f39b0c058c94410cda8b210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5944c818a650b703cf137ffa7b9c49319
SHA143bab259f4c309416ebd845a667a0ae3b243fdbb
SHA256e4668abf085728217ae1f12bff83291c1a00e6f83298177b88f74f4f2c6c8f9e
SHA512f3f975281f72b5e1dc1ce7a68255e5d6f3110abfbc0c481e1d2411e9a6bdbc56be8b6ae6fa5d67b49346ab78482f89cf75cdf9c6ddcf5172d273ffcbaee7ae8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afb419dbefa372a39ad92f8d1246dcda
SHA18d82edbf2a1256d4767af1e77cae3b12a29a70f6
SHA2563e07086a24109310617f6fcd7f46f4b09169f7496f0c852482e41126c39eb323
SHA512a389f226f6085752d5d8707346eb8c00982eab45be61183b41ccb5e34a196ee6afc51985560bcb9df4f042e055c8e6129de3b9c482cae1524a63011c2fcce0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d0c2201b88dc63702a7a8bbaf6e0766
SHA17e8854635d3c9f9ba201bb69def84604547a900a
SHA256ba1ac7f1289931c240f5241f04aebdec3cfa1168e74c53bf408b7188465826a0
SHA512edbf1307196890fd3e7409b54434a04af34ba5fe2a50a398d507f1e10155ef236e3c60046fe0b7086420728ed5f4d84bd6b5192aa0da65ddff59979a435da50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef46d4ffffcc07a270ae850111a007c7
SHA14c5bfb65dae3492dd8e5d35e574ef327f24b5b9c
SHA2563c811738e7fa00846fdda8dc54a9aa621e213cc9e8060f12710e0e41d985defe
SHA512db20f16b8541f7ffc21c66e2a9fa6d8242a1ad778731a9902a929335bfe36bd6bacf4d8ec9b422b33df560b497afcd153115c36964b856e13f71ded99db4b6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a49762d2c2bda3c7c0f97d940577d166
SHA1c62db69436a90a38cd9c2cd2b03c3654e022cc77
SHA256e5bd30eefcda23d4a1e5a5d95a27d225644bf1491a510e16e69fc720e47ce9a7
SHA51278fd9cff4470bbe8679b3b32770de1ac9b2cd4e623783a64e58796b3d6091f32ea208989ca03eb03145f64901e4ecf8b73f3e3c978c409ef79dcc2f522ddd6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5042bf1ae5f02801752e3c8139cda3360
SHA1a5de25b754d749277c070d56283f51719d669f25
SHA2569d05b110db7eaaef891946f999a4f0e01221f798c8b90d802f39c318360acbb6
SHA512044d85b3e57d64f3be7e06d9d15dcd606ea9a7e56fd967a674734331d856db611dadf1e0c8fa5b0c04865cf342007b9ce31b50b6eb25d46422b3c8d520edc8fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a62e2f73518b8da1cbd4e7f55b06de9
SHA1ff711f0215646f0acd8302639465824fcfe96b1b
SHA256cba7c92973e478217329b64adaa3cb0ce658db1eb3acb8f70b8dc568ed1ad342
SHA5129f118637a80514df13e1249ef225ee2b1e2d079dc87a1ab50666f809571b1d1f75772a81843e248697b71fa4ed9ae5dd48f38cc21780d2c97c377d5d850b19b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507ee3afa6c942ed016d947eeb4575fcd
SHA16ac2c31ff3513fb4c1657f1ba77bcce87cc083fd
SHA256b6d19899b5b84fd73bc205382c439159a3748219d620979b1de8915e17c12c42
SHA5127f6ac14c32ea9918d3ef1aa0a6e7061a3cbfefa290af7ee6eb8d32aceee70e8a0d0a5dfa45b9e9123b6ed9d6ede12645d2d68c238ef716e0daf0d364e5604b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544dd711049ab7457a510d99d163cd7c2
SHA1b838e8f7c20d5fa2e298321f93570592648940ae
SHA2562ba3dd7e8c834731b74b0269d5050779735d2b4997b14139310005f4976b2447
SHA512f482e55c29084035919919d8d7d09e45fbcfef6cc2dbfd33b3b8b2b3e9f828ebf378775cf73576a7660e9466bf103d0bb96b2bc97699fa2be078a577831a857b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06