Analysis
-
max time kernel
148s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 19:57
Static task
static1
Behavioral task
behavioral1
Sample
026b360343792c580e2e61064de0f3db.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
026b360343792c580e2e61064de0f3db.html
Resource
win10v2004-20231215-en
General
-
Target
026b360343792c580e2e61064de0f3db.html
-
Size
6KB
-
MD5
026b360343792c580e2e61064de0f3db
-
SHA1
d1cd43b5ce4a19f4d0edcac3f25485d0e51b9660
-
SHA256
e5b49b0ed210442a360024e713c1a056bf0f787d4cb9f0840c4989fe2b9ba1ce
-
SHA512
48ddcbbb9c0af26643eed91d6a3ef22e9fbacd493a538c8e0e9e9748ec04eb94a94675f2f305b72f78a5a052c3d42f17264395c0c28bb1683bf2f2cfbe3e7a98
-
SSDEEP
96:uzVs+ux7ANLLY1k9o84d12ef7CSTU1ZcEZ7ru7f:csz7ANAYS/Yb76f
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e59a399d3ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410046833" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{627B47E1-A690-11EE-A7EB-CE9B5D0C5DE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000bee7e8d6054b5bcd6fbb5038fce9b56509598f5ec750dcdb37c8e528a9747efb000000000e8000000002000020000000bac6601c038d79651f64291823897b5e5a2afd7cc094e69eba32713881c4703f200000009ec60ebe943dd50e03569c100486b31011ff0661f3094c279f94b68f23f2b8ae40000000a0a97d7c9d251bde4012c719008e8e62826e648b657f327bc3af07e46ba469de4bb94d0ab9c9c642331022aaee97f0231db5cc3d1c8ce64e59219d7dd4f0b5b3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1256 iexplore.exe 1256 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1256 wrote to memory of 2684 1256 iexplore.exe 17 PID 1256 wrote to memory of 2684 1256 iexplore.exe 17 PID 1256 wrote to memory of 2684 1256 iexplore.exe 17 PID 1256 wrote to memory of 2684 1256 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\026b360343792c580e2e61064de0f3db.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee7ee1efa35e4b92fe13d225a65e3fea
SHA16fd458ae613fffadc3188ec10fbf394d26451026
SHA256e0ab9bb7522fe049ee57762d2d6080066c514737280663828fff16704319736b
SHA512b8e2dcaeca127fd7ccd667a9980a81a1c8aa46f7f9370659d3ddd523db706a3b8b08f23586f751ee107afe2d2e89e93ed58ca50fe922f032f90421ed59e82999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fc2037b9edd14727677f92b5f717673
SHA156a589de8aeab2b01e0919987b8451643332190c
SHA256c32524c058b5925b7bf8743c8fa01dc31f53b6b30fc1d018975ebafd3d3e7be5
SHA512f4b2ebe4c642de1086022b6f69c8750f7b169848a71a3e51b9fcb710919750622b20ecb57973988a5c1f1217a8155b8da7291097f1a612fad3290a05a12fca7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5459b29806e134579c4c3cfa0fcd7dace
SHA1d7a274c887f40c999f035cb17114ed9e4121401e
SHA256afbf02ce71044d391684967948c66f2c208accc9b2e38d8381d2bfc2bc319f46
SHA51261a00c46382a357a1f0c1f29c4266f1a268079a8b53fd067d9fb0705e6490d21066ff980c776204ceeeca4e7d30488723a4abb4e58dea443e8d00167481858f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5289a688e827356c2604be5dbc0a8245a
SHA1c135fdc4884f95aa193ee63448c51bda2e7da9be
SHA2565ee3bfb220694a735c551ace2774580a92d6f32b64a5742e6c16ac85fba6d5ff
SHA512639ff801fd5fb592256cb93c6e3089433b8a6f2555f2bd3c9a338dd57f54937befac322b4282c4c73ec6a23255d35b2d24b7c4396a24f43cc5aee1c2bcfb6330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1c146ec0487c3f6632de0dea0dcc576
SHA188d216bb049ed424576f7ac0093114e7a58f86ca
SHA256ece8b16fb0cde484c21d15f628c36419f367f79db24cf9613222ae5275329cae
SHA512e271045d0339ca17c103c46ae0922c2cf40e8a3094604961ec72d460ef91c1fa6c66def45e78def0455fa5ea0298b2905024f5400b6f6d9b3a46d9ebd8ee79f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c92fb2fe759198b71c14bf0e103bec94
SHA15b476bb8975bd56edeb626749ab8f3ed7bf17d27
SHA256e99e36c28e511589af4145b5815d12b2026d8071bd9fc79438d79ed0c66c11d9
SHA512baccda864d2dc251d86eaea373fba1260af64ab9f601bbeb1b3732b1289c9b727c9ab9cfc809776a81922489d7b1c4cae5a92beff185aee68e37366b4deb3bfc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06