Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 23:09
Static task
static1
Behavioral task
behavioral1
Sample
1f7cc08b86ededc56468ef2c6b9af6bf.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f7cc08b86ededc56468ef2c6b9af6bf.html
Resource
win10v2004-20231215-en
General
-
Target
1f7cc08b86ededc56468ef2c6b9af6bf.html
-
Size
270KB
-
MD5
1f7cc08b86ededc56468ef2c6b9af6bf
-
SHA1
f271f51137633f28bb7080b9d4962beec21c33e9
-
SHA256
7ddfdbd174bf9b81c593ef6d9fdd58b5d40f1bad15a12407399d482fa0292316
-
SHA512
2f755eee7ed3c283ca15ee667fb55fda7acf9f7b631b40fd5b9bbd4cb09695bd5c5874a4e22eb41b61296db33cf5476705099730b667f6bd16dedc2bdae42a69
-
SSDEEP
6144:FklcyklcSklc7uG/bI+3SkcXklcPEijZeqhREijZeqLb9nN+k8yH2hz3/zBD:FklcyklcSklc7uG/bI+3SkcXklcPEijA
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D2C0B31-A896-11EE-8CD0-DECE4B73D784} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410269218" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000494687e80eed63762c47bf2e592d785c0e35c8e32320784b92236be0dac1478f000000000e80000000020000200000000813d9a6a5e78fe163f81990d7cfeb7d3e1f9d948e11eeddd26f4a4b9d5577df20000000a1aff4c832203ee11e2c5529763dc9925d6ce1c073ebedb8791e3370e14f11204000000097a08695db22b9dda93bc281959ebf436794e2e41c7ce09311d04ba973de1f75da5b3d6a032d12e0dfc6dccdd16d14cc6da93ffb6376fedc50d0a2c177d413e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d8f91da33cda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000006ba64d8b5f66128749915502bf6242d6586894755ef5043b2a7b4791a118f01e000000000e800000000200002000000036f7ab70b922e84c967d5a019cc74c81810f0b90f4e53f7b73a14d4581bfa780900000006f3b765f998501b24ef3141012a80e574fb869ce5e726721db6206b33138502655e815dd5d5867725b305478071ca45fc9786f1d1ba122bf89a2753fb3f8f16a4b4db12c1d639f13afa4b13cfcd31f860dda32276a11b05af3060bb6136d2ce1e701692c8a52bd38233cc5fe868e81073585a6767d231473595b9286f00795f0bb34d9618953b05ec71e72196622857140000000a4f8d607729804df69a8d3f1e62ff8d32c4cb093ce1930ab09db4ff8b7a7bcf0830da5e9cf6f0c57b0d2433673f02e8bc7415e622156e67d0335cfbca92c8622 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2644 2088 iexplore.exe 28 PID 2088 wrote to memory of 2644 2088 iexplore.exe 28 PID 2088 wrote to memory of 2644 2088 iexplore.exe 28 PID 2088 wrote to memory of 2644 2088 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1f7cc08b86ededc56468ef2c6b9af6bf.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8062a19654d6ad6fb59940f6f217a4b
SHA195c0bf19902880ae6041387c84d658e340e74b01
SHA256d1af5ac9c6c673787d9cae978c735c22737a9a629667daddc1ef5bcdcf8547ff
SHA512d798c8a47bf863a0d663a82e198b59cf67ff6233d546d8d11a806af36d476f77679590976870a704c3a7e9aa33599735284ef2636339ca25f2517f1d39ddd5ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4c396bd470bff5355d3e63746937f15
SHA110a141ca6adbf17f240d6c494ab7a20381f0bd62
SHA256c9ca19834887abcc2db37d3bbcf9d16b87f1fae25d898449e23a9c184688c3f1
SHA512be669d55adfd441cc9e5a7e89ecbed9ef3b1276c64455ae966a2365be4f2d7e56c1733c58311fca9a75ae3372d10941aa97e3c8cf1226163dffbe664a0c8321f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a838cf163455e6f6560be79d2d2784d0
SHA1555fc699932bd34456a2126bf4abd5d8bf99bdd3
SHA2567f9bc36605f24e7691e43bf9c37a466b81ab41809a8de9d9ce03608cf53b5e5c
SHA512a4ae1c1989e61f8c1ba34a949bdf699bd93e7c0d2c3f34469c692b2facea3cbb1eda29b810cde6ff92442d15c8f9782d4524e3b83404c374a3b3e791714a39bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5985c5366b0c5610cb3247eb716cbcd67
SHA1d83f05b81cd9e308413afaa226e671348ba94193
SHA256481325eb9e0a7cb91fed2d54610d207a4ad138665aacf65850650bbaa9822c1e
SHA512cf9544fb8f0cafdf3112d37690784ab8b906e8a432c9e9d821f5766b641e424b7a78efae0f3494f6510fdef932048aa3899d3e12410e620b1a7d0932d4a0d91e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e816c31015130f095228371a1f41aa6
SHA1307145bb14b4f10d08201d584277fa6df2cf7e25
SHA2561e24affa77bbb6b68740b09c54beedee296910c7d3d2e91b5e9abaf4743a3334
SHA5121de454b855b9f56ad2bfc764d775eb58ab98c719d64c04db592f5d0b2b0ff7b6cf480b7613b74efbfb67c42c17f5a58cc9661fc77797ef136c54ebd6f9fc1c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2d50c05e1150ef0f378b6044143606e
SHA1c6467c661c56c8ab7ec6fb2051ca12607a544e07
SHA256ba1b861fd817d20725b90a105ee55b60d80885ea3649cc89390252497e1d8f1a
SHA512afba33fa8eb09e12e337c894009baca87d32580b69b67c2071b0a346bda3633e4556ac028c9825003e5ccf2416c5407d005c19872448049ba782c18827fd52e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d64a2d156e17fe48d8867b6ff0b4002f
SHA149d8757145052a6d4d9987c4224c26f6a8b58580
SHA2567827328ba1cd990a000d18a08685f76ba3a5551f50ee7b1b32e19b5edf70e6ef
SHA5123ad1a028761398c929f36dd392af2af00cd2e0116c320984aa008247828881b9beae4f7a2a92d00917906e88b7b5ebfd2c8d1ea2d04a833a74999d50b010a0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fce15a313519ed394554f37b79f5de6
SHA158ae77ddb444c09531c73c38f69fd05a69ffa4ee
SHA256c10f4063f8a5e4571ddea53313469273f88c5d7d66cd364494a1954b61099d26
SHA512fac01be907197f2e17332a97c22f7b9801e7d010cd58fd8b7b5ec9df0109b6d79e4329287863a1f363bb29e4f67202f5da2ed916e6fd51b246e09dbe292aacff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3ec4243a2529404d8360606550d7af2
SHA135eb76dfb69bdc7c9cfab73f156acdc98626ec45
SHA2566997ab9ba57ca7bdfa470f344af0e7a5d4a18a91a400361361582c38d8adf8c5
SHA512498f04955ad12fbea9a4e6f107ceb060f988a1b37df7c4a621090e82e4624be9091e0fcd850f701914c53ceade9bcc461880a63cfa39313fe85f7345d7296d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5265c0ff98bcec5c42454dc2d71cbdc
SHA11ae6324287e5bac6c3096bdba188b6c2a9c212ff
SHA256f7f2dd89580805297cb1ade4bd856ca3f828eddba6eb1290c81520719e96c1c1
SHA512d28337fdb0f5b9732c3bd75f11f8473202bcc7691db5bb951a20d47ba0e61dbb4e12c1038e3762b194e34025a4698330147b0c026c617b680db578e63f030c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560f2a018c84b2340bb5410d03b71ca44
SHA19249ec929588b9dea8fbc657d9561de1f760f918
SHA2567c88a8aa9852fce3a3a32a1729e0d0a4bdade37e0484bf6af5e366977315fd0c
SHA512a5a99850cb88d9f68700f05ef5361f69c5fdb06f5a365e4927a1827407a8f847a7622549a562361e440f87d8d1fd4027e3e5e1eb31ae0dbacac1771642668e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5281b037165354dc9a37942d38830e9c9
SHA1ed1e8a51f1b6ee77d3dd8f1b928504325f969174
SHA256ff70f1cd8d65d69b909e27f0f0030f5c95e239dfb8105f33fc01c741fd74844e
SHA512856795f4c9be108c4eccc9a093efcae0b7edbd5275f061533d64b89d3877473deddfb0282328dedb7d80aaa887dc818ea016a4eff40b5b7fda094a16ff37767f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517cc411ab8a314dbc8551d6594fd67da
SHA186a0a0d9044e14cc61f807232d9905032faf001f
SHA256f30d505004f601e0e0715595f5aab751313b49b42a1d350956ded59803b433f5
SHA51287ee1d5bec0b49f70a331ddf87b65a64925bdb70e24b392b8744cebd1867575e35d0e049d71d098c352d40d4d0d95b4a8a62f17e6954433df6655d771b127b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55728f54efcbabd4ee43bd0fb30b21a41
SHA10c4d8cde267f8d57be10a02d90b091bbebf094e0
SHA2564d73bc19dbba52753fbfcf7a103918aba5113ff430fb7426accfa3ba265d4e83
SHA512d62d02c57d2d47c55b922b7a2ece801dd70d50285f7fb20fe434490d967323622ba1f928285d045e05f0e8698158b45e16181027c56acf0b1be04311e50f29cb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\plusone[1].js
Filesize56KB
MD51944af3661da46249991197817b6cd8b
SHA1f952df40ec79fafc7c798f37aff92878977376ed
SHA25663326a1c4e0eddd3501f0a064b06a2708eb0362f3ae934f53145978d3d0799b5
SHA5120bef19b32be337cfba179ed9ce4533a207cfe645d2e5fe0da9fadc7b01c72704fc89749670d1ac48b8d494675bc62ac089fdc4d8495979226f10828225594376
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\www-embed-player[1].js
Filesize322KB
MD5303d9f3d8084d98c3cfc81721790f192
SHA17bd3f1a1f6b4752b7d646dd45051e446be259a41
SHA256d854531f9c3833536d6971b4fd7617dafe1a2c6fd0bbed9469122e73ff3b13a1
SHA5125dacdc9b308da058cbc33e80a4e4900adb17bd63c9b55316da06cb3f0867257180d89cdf7d0069440cfdf5a696f66d2b6161add2e090daed59114bf1d6c36aff
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\base[1].js
Filesize2.4MB
MD55bdc213718b5e58cdc9646967810459e
SHA180a2b274802a65a8828300f961e8ea30166767e7
SHA256fd8d118fe8ac283b6e6ece58b4bcbbc06cd734f11761faa7c46ff08069f711f5
SHA512c164c540f71c99784277e542399dacba89fafb9de63ecbfbafac636dbfd75a46093d5a71d8f0b63d2fba65fae20e84c0fdc2786e221bb57f553a7c656ec8c5f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\f[1].txt
Filesize34KB
MD53e47ef57df160664693a84aa6943a9c3
SHA12770e2c7f0b1f5d1b7210ec273d88f49ed5a416e
SHA256a490f649cd5ef6c02a82668a15d665adc34ffc7a94979bc2edb89505df28da26
SHA512904687d537bc0c935b6b98c2ff77d48a0f7b59d1f4380cd9f1113214b698b8e91842ed89272745779a92896c2a2866b67734f6eb1255e9c9fe54ccd0e7d0909f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06