Analysis
-
max time kernel
137s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
02bd79e6d98a7b598f6fe1bce0829ae1.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02bd79e6d98a7b598f6fe1bce0829ae1.html
Resource
win10v2004-20231215-en
General
-
Target
02bd79e6d98a7b598f6fe1bce0829ae1.html
-
Size
90KB
-
MD5
02bd79e6d98a7b598f6fe1bce0829ae1
-
SHA1
f0b47b4ded2cd49d13c6024ba78dd98626ced146
-
SHA256
ab32f0ff4776f73552b4aad5110df253cff0f1d03a4dffdc5edfdff902b1a533
-
SHA512
e4ca1d27e6efec7278f1399cabb40074ed1e0e48c81068a735ed8a78985f08d58573c977fc10bfab7998bdd67bcdfb0b9467a8d22edc520a42dd3da9adfdd6a8
-
SSDEEP
1536:cJupn9cuU4fw6oRiK70myPaIt3ZvxQhNhPJ5Vr+kNIVRkk/zV1yZm:sIK7fy5+F9O
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d60000000002000000000010660000000100002000000011e4225cc998cb56dc90a5e8db29023fcddeece3f41d6e485844a16721905807000000000e80000000020000200000000e5aaf11a271d3b4cec83687067eb3d6064c70ea390197ef92b0b96db3b6d68420000000239288c33643fbae22c94b795c3f4af311656a8fd2c78aa8d8385ccdcf8e584c40000000f2c80091f8744a28121bc32aeee73be0c53986f46ddd409ba26ca553d5ef4275295bc12569bceef24bc1495e889bc8a0aab04c8f35dc28287bc285cddc84dbe8 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F01EB31-A696-11EE-8837-E6629DF8543F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10fb8e4ca33ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410049424" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2084 2212 iexplore.exe 14 PID 2212 wrote to memory of 2084 2212 iexplore.exe 14 PID 2212 wrote to memory of 2084 2212 iexplore.exe 14 PID 2212 wrote to memory of 2084 2212 iexplore.exe 14
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02bd79e6d98a7b598f6fe1bce0829ae1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528d4f7d2ee28f66b10f9cb72a47104f8
SHA1239c009dc8cd5c69b8016551eb493e8b4448f669
SHA256f4d1c83f63456610a419c4db9aaac7a4d2439c73ff78c61ff048e5b356e4de6d
SHA512da270e3077471ec570bcdbbe13a7ebf020624d4ef5a38f598aa659f0900d6d3284cd66895d09a74d5e722d880bed67818f04b54a1655a1a8efe5f1525ac998f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec59ec1cce3ceeb34cf0e525f994eee3
SHA17a636dbcc0f0179c53c175914eb90fa74129880f
SHA256319820d882e89a2f04f82e86b2358e841ccc54782fa027dc4997d5b527d3cc7c
SHA512eb142fba69976c0ce35edcf265082a92ff28ed46a54d6791a4667f5ef1485fa5e8aa9fef37492c27a0f26c82ff7c485c14c508cc14c65b324416a10a1cafa639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528bb794921c82a2d83c917f62730259e
SHA11b1f66461d8ab92b7428a5a0659ab74ad745eea0
SHA2565928a55658fe40e984e079a5cca54877cdceea8317b8451d8d972db27a6eb429
SHA512195c5c24c9eef0d9601e9a1cd11b2a6a27aa4716befbbbb79b97e8431dc6f7b850eaba3764981b2d3f02854411ae03ac033384fd7b261d4b8f189ace21149f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffa89cc6bb35cf8d867b63458bc434df
SHA1b620765c75c1762ee0b3a62c1fbb0fe45e05ea4d
SHA256b95b8da3fd1fd7d005199bbf9c9a3f1839c496484f7615886f568dab802f70ca
SHA512823e3d4d641b60d8e4618fd8f051e7de17b80c933b94befeccc60eeeb0bc7a2e89fa86428c2b7ceda6603e2ed3db3baacff90bba3c46b430cf28298c4d4292a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eff11c0a5286fd9ce8ea2f56cff463d3
SHA15d7164ef54fafd2c97ef411d8dc2317f319913fe
SHA256aed7670d4d7fc366d81f6944a3f18fa06f03a3d21f9e223d28436599797977f4
SHA512a21f3a01b0f988f65250924241378455d1d18392cac6f22c3b709158b01e2543c369bcf4d26e5b85c3300ffbd2f095195a66b712f185b8d53a28046f9f34bbef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501102317fcd5acadcd8a8261c6dfe3bb
SHA1d24ca916090ff773f87ed9e5003f1a8a0a2e57fb
SHA256a8b2b0bb48e991483cdd1f855ee14b26d9ee6055c6a78d30fe29e649107bcf74
SHA5122cd31bf1750d2669208112c4c6a285370f1ba3b8a6345422a352717dbd8f2869b1d9b9049c360fdb6fa21dbdef3aafb430e7796cb4d45dcc843e693842a077a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0db7c76351ceb961f3fd99d427de239
SHA108fe6e6eceb2ea6bc5639548efdf799544e424f9
SHA256549ff6d764ff688b1fa2ba306479dab6783621f4c30915fb08a40a798ba748d5
SHA512eaa7313d2fad7dd44f5c96a052651522baae27ad6ac495660cdf1f1c2c84eb05f91659d3cfa5c607c4778f8e5c1e4a7903aed52b464d6ed7dafc4da57f9eb28b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5823cf9c6b35bf7f0c3fb4a0a3fb24ee1
SHA18677658906946c4c7e667670ff6aa9b3adb9df33
SHA256f0ba64619b1351dcfae3db304d0d2bc0e841fe152065f6ac9cebe4044f52b65d
SHA512eb4eb057c9acb4a6c58be2efe39caee801292dd6c3b26ca90605113f13a10f6cfd77a89ca0b90344e2d21ee9ccdf7ecd82a696ca958d93eeb9cfcc3626e26dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5848566d96234c55015d476e57a5cc64a
SHA1c26f5b4050152e7fd1921cf317aabb589893f3c2
SHA2568cc1ac5dd88467b4c38a30f448ab891068630504cdd902861e6d1d8d81994ac2
SHA512cf4c02eb646ee5a4dcdc42f206ce6c13211a8f67a390bb15a45cbce9fa5510a740b570c446f5fd46965d4fc3d2c16191fef7798435246c8ab86fa7cbbe879273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e5194f3b86c50786cbdaa1e53b2a476
SHA12e9f0d3a8392fcc77d9bbcb012dbfc3595b46a88
SHA256644e0fe3dcee28356f48d3f130969c2238f29991217ba421db04b6a104853189
SHA512820af505750754f1e881164f5f7ef70593b28b8578b78d6c0fad62991e70749e3d2f38c8985c0c2bd8e40d013077e61b9a60d8ca3930fd4c40c74f7bf287527e