Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
1dc3c942614d0c9afdfaeec5e17b1aba.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1dc3c942614d0c9afdfaeec5e17b1aba.html
Resource
win10v2004-20231215-en
General
-
Target
1dc3c942614d0c9afdfaeec5e17b1aba.html
-
Size
23KB
-
MD5
1dc3c942614d0c9afdfaeec5e17b1aba
-
SHA1
ffc94dbba5285af4ac071f6fdcb9a5c139c975bd
-
SHA256
b07650e53cac63b6ada677caf35caa12a34121f69a9a8a4cfcb8cdee8c8b6d69
-
SHA512
18985b51cdb17c2819160f0935bd0a68786a57aa0a7eb3c61c42d9d2d764d9c39d1ffcdc97eaee893f8d09c140641de5efc4ad132b43c29f68669715862b8209
-
SSDEEP
192:uWj2CFlwb5nw7SOnQjxn5Q/SnQiepNnynQOkEntGgnQTbnVnQPCnQtVwMBJqnYna:YQ/+a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410256997" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6010771-A879-11EE-8D15-FA7CD17678B7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2160 2340 iexplore.exe 17 PID 2340 wrote to memory of 2160 2340 iexplore.exe 17 PID 2340 wrote to memory of 2160 2340 iexplore.exe 17 PID 2340 wrote to memory of 2160 2340 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1dc3c942614d0c9afdfaeec5e17b1aba.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5bdb477b22b756d39801135fc4465629a
SHA13be9f29d76750b15f548e56e5937bbdcca9a4214
SHA2561f936bc615b1cb07561b1ba70b76536e0027205e20e710125a3f1d040cb9e497
SHA5125679df879f0f33a34cba0739d19c70a1e1de9fdd7852fb5e2f5cfee6c2bb3a83d85906180a6cf7ffbed0895254a273671dfd45f800c37d60537165ba298f8921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57efa97ce79936fd503a1940d4b927716
SHA1ccfe17cee2483d80286a1192886061a7b6ce6fa2
SHA2560b633eedf7b9d611e8311fe340bcf4a29eccc307a67a7657ef988551aa7d6f14
SHA5121b846acf4227bc67a6b866b2ce904255f0d00443e699e5b07fe592f4b6cfb023644cdeeb2f1854af9cfcca4df943a4a238d8788a2e98e460d6af0f0122a8f1c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7a1e7449fb86d7c187f81312c9a9c17
SHA18579863e932462267e30109d2e55a4c6938fae36
SHA256d780ca9c1ba69315255b382fedd7fef9fd199197b3e9bd4c02b2a7a08e497920
SHA512a780fd0f02b5b09aade9205e4679de160cc02648e3b16617578f26b5df3f4b1d24174074672b8460c84f9e5879246d195a2427c942f71a7228836ae44b8ed0d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51027ce5827cda9e73e2aeabef82cc0d2
SHA1b7714ff3e6e67239593f65e348ef41b01be00b90
SHA25679ab2a854e40c36b10f2ffb0d6ed6178304b89ac4814654853218ba072d4177b
SHA5125a44e673c3b3243112050e83dce2638c28c99282086afdcdc5322178aa8f52fcd506eaa7f386f0b1f3dd7bc6450328b940b24da376ad24ff67755abba0a0d53b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8005d0dd08307f37bc372883335f11c
SHA163420d2933050e1f2cb2573d3e2bb0815982d53a
SHA256353e50b5e43eb1353e6c60e1fe16fe5cd4457abda8081421af4adaeec5df2c02
SHA512caacee79b85f4771c4a28b6592518bbc7d487f33e2201f56c22bc9640428f006559d94a7401b65585ad2db98713f1fbf881b7a6a6a9a93c4e1b2b0519d168116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544e3daf90c7e8af5c9d2526001ef2d3f
SHA1ebf2651208112cba4cb2040436b828c47b303dba
SHA2566d2f2dcea58d5f8331d88ce4def2023a9d3e9d5d7c0b3c5aed4cdcb7bf537cd9
SHA512ae98070f68c008da4e40ebe893ae63596a0ddeb65ea53922f23db7d1ed2c86dfba85c5372e80e7960d410d521064ffa3cbc4568305c52613cf3e59c9af057df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5977fa5c4bc4c8521736f7d4e65cea2
SHA1f2da2e8be44745679390dc1a5d25cf93bf07920c
SHA256a17c561818902262f05811c97068e7197a06947707b47d1a8f5e33b8482c56d7
SHA512b3dac75fb78bb7ffe05345749cb589fbdd3aeb012b4982f366a797531640bfb8772e3cba352886c7bbddd786dd1a77223200ff8437ae0139d981dc5f5a03464a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560f05dbe9de3aa5b12f18f0efad0f665
SHA1c9e33d11f5760eb71993a429ca0a2cdb5e823632
SHA256c10567cd045ee24e691c8bb056d433f51997554f4720f017ef81602ae7accb8c
SHA512e81e9f1299e53b06dc8fcab5b37aa835396139bfb3268d2d5899453eb9b93f3fc8af930670b62b64e994217a6793dcffdf19cc51fd2324ee42be864ebabe574c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56c539b8aa426e1caa5af6b881113bedb
SHA189a3e7be17d23b0e90a904450f1934071489a207
SHA2561f840f21125143df3837665b77afa1ca5510a94ed9343cc734ae4086fb0231f1
SHA5123062435eb6dc4569ec0711e5db1ef750b7d64cc8c15f149efefc1b2430afd58ea07be7289785765def48eb509084bf22886d59582dfcff79453aa5c713355571
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06