Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 22:22
Static task
static1
Behavioral task
behavioral1
Sample
1e5609a90b965da7e35704d1cf44f5d5.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1e5609a90b965da7e35704d1cf44f5d5.html
Resource
win10v2004-20231215-en
General
-
Target
1e5609a90b965da7e35704d1cf44f5d5.html
-
Size
432B
-
MD5
1e5609a90b965da7e35704d1cf44f5d5
-
SHA1
a18449b914ee48510c23a252511683b1db471821
-
SHA256
99193644d025d16582517601091c4907121d8cff279cbc93d45478de0aaf210d
-
SHA512
90127cef428fdcc870362b8fc3e172b4e2aef504107ff5a77a0f524a4fb92fd8dd4c51efa465eed596aed66d33938262030ec5134427b1db4e245eb5443189c8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0564821303fda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410549752" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f120000000000200000000001066000000010000200000004ddce49dbca0dac11d965db441a910676b2f9f847c4cf84176dc20469e5d024c000000000e800000000200002000000054d89c976da625f4260a4574f9fc66a204348af610f78be8f39a912741d9b74c2000000021001dc9b87e3661e9fe13196b30ecdbdce404ab1aa993cda57a877c6a43e6454000000003def20d42e5d4ae2ecad95b8919dfcedb5deff97ee4816a79a05baf1584a11f58f4f672f12bb533363196130d118bf75dbf0143440bfff22f3e594ebd89358b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{575A7881-AB23-11EE-834F-6AA5205CD920} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1048 2968 iexplore.exe 18 PID 2968 wrote to memory of 1048 2968 iexplore.exe 18 PID 2968 wrote to memory of 1048 2968 iexplore.exe 18 PID 2968 wrote to memory of 1048 2968 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1e5609a90b965da7e35704d1cf44f5d5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ba5e2a5818bbd318f70dce86eead7b96
SHA1d30602466a6f7787da503eb2f7dd6378fb6b7393
SHA256595d07c482f3a6397abc62e1a14fe2b460ddc04087cc735528a2328980149c09
SHA51203616ffb57ba82e4322aa84a88b4268f991148d2e62da0b977c6c76786e18ccd4c937af1e4789f8b2678ac3e3b057dc6c88d18d82002a88f3cb84320c0f44a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549e176750384cb4036e3a6d3389ec58b
SHA1291b1bda48573582c320b53b14e2d4b489289102
SHA2561d502a37e6b76c7c410d692dc294c1c05fa68d9d28b2cbbc5e8a2cef011a6d9d
SHA51251b970d983af7dc953df039c74a118511f8382dc45c2e96c16e9c8e4c418a7d13625560d96f638fae0405f9c09f0a2f76a141c9bbd49c268ae9eeb5d2b6aa182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3068f4046219f7922dc17ae6ee9013e
SHA1ff586df5d86ba47f765b585aec8700ee6dc82100
SHA256299b9bd19edd5d191536fbd5bd4dd7844ae7eafd8e2c65ec2a640e625db45dec
SHA51202b3c30f23ae2fde4b1fea312fc7530751c9c7499da77ea3071192e6928b1a681d11a32adf98921484cbdfdbed88044079c29f2d88bbc3bd4527736cc566533e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9b7e8acd602b00feee912804fae831f
SHA12c0d497c436ea16b25db266fc8558efe978dbcdf
SHA25612c25851ff1c461fb81965e159a9ff392ccdcd3b6247d6f2aa4aa9dda40915a2
SHA5121066427dfaa7622b477fdf8cb4da8d951ff5b4e16a638c79859c06866d11a56990839f9c1fc3c19b7dcd214b9ffb19c0f3667b767ba63025180ab2b94e11b1e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56efb7e6189023bed6f5130d63819773e
SHA1a9c08a549c577efcd64d85d4f9cbabdccb927bca
SHA256676d043b6a1bab0f55bb22ad6c3bde4cc0a4d8d0ba3d27e98abf9edfa69065e0
SHA5127ed431fb244beb946f893adb1f0971248731faece14335b661598229f30d15c2e20694775f0d315b679b15b767c51a1a49780703d937f4e82e882b614202d097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cb537c80d92aec4baad6fb7c38cc496
SHA14b6017b823efe099a8b1352e01a916f0a91a9a81
SHA2567a7f3c4091933d405c83066b5b17ba445afe799a7e62f3812ed544e862e23605
SHA512420102387ac5d014150ed201c82e0b01ce81a80c349a1d956933829617367362958008a33bad8442852d9c0230cd32062fc827b3b50e6e7f7492c8bb6994c662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2d2940e5e3ded3ef5bbb5ee19a1045f
SHA1d2d3c75ae1a60b9b9f3c64332afd805f96514047
SHA2564e72fbe4b46fa21c435eb8a164888ab9ab37b211071ef9ee4b2035e5abe2c01b
SHA5125405ca8992730dde27bcbf2da4950be3e7b319044d0196eb3fed3fa4cac94df801350c5a79c1414e34fc25471f0ec27b793e9fcb4552cf33f3d43cca6f6e5167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55266c2db9ef47c85a2dd5919986a45ed
SHA1f5634800a1cab04b79b716fe91159e9b5f3de9c6
SHA256ac9daa8f71f7c9c1e2635d7f8ae336a2060d83500f86b89d011f8a591956c0bb
SHA51293e7779d32c789a58bed6771b3871d66bb0a7f582d493ed6fb169bffe9b2cfd5782762c1dcd2021dfd3cb1ba48b83b62ea5c28c5fc7e57d116f1358345c1aad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a505d3bd7d0680244f41f9499396668
SHA131c73436d680dcad02dcb80cf2521ebe36281e44
SHA256a88a341eb2694b9e6417e901fd6986eec939ddf5b181aa02e6792dc46d304989
SHA51263ec6ed5c7a1a34fc5e0e15cc8fe0f5f980938fdfe953eeea91cddb8bd3412f21f515c93f229022486a5e140051c5bab23e8aae6dbfc2060604b75d49f90d401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b7b45729a94a2f6d41e52d708a13aff
SHA1f8453eff566af23e99f7218c5ef59019e6eaf2ed
SHA25602f5e510cce16bda1c117c8351132e32d7bbc7485c0b23ed4c8d1fdef44559ba
SHA51211a09ea7514d525170d8edb0bc972ea4c28ac06463d1a1f0e2fe3fb22fc3592686f72588f6ba95d4a8e46f5477bdf93f824089e6c011c8d13db896992080b51c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1d998c3b1af9eb70c77de16e9a7125d
SHA1b38b13bd56dd60ed3f697bae861c5dd7e6bc94fe
SHA2566e59aa2cf4bf302614bb4b9f326e0d8f74c358a0f694338506576cd73c24e003
SHA512808a934fac27803ee35fcffb6e8c796b8497df81b1c0f67f97ad418bf35f521a64c279ab1af945e958c7fcb2b25646ba766751044de66d366bbe6388567ddffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54e00b5767fb51e17b8e787c2e9efd2bc
SHA1c9dbe613202202d9168845bde23291dc46e46bb9
SHA256b5779b89860e5f827962b62bd514837c58d63561e9ce511e67eae6a32382f968
SHA51214ba25f1432424a1f02d95908872b8856318f4646729776d38c537fa6dbfe79e482a2988cce0bfb194ad4fdbe105357983cc79b649b10c6d078441f7e920afa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
1KB
MD5f1b025a17c6f0be95b79dd3a92dfe3b8
SHA116e7b08b729ae3c8d96f6452388cc216e98a1461
SHA256ed2aeb59ed52af1dee4b1c7d4037e91d95e9f2bb5131ac5ab56ee9874c06e80e
SHA5128709d491a19c6905112177360cee2a29806ab8bf7c8917f4271e7d79a7c9693e3812e5bc07236e2bc1c15f295ba28fbb8eb2b7ac517b8c60fe8822cb38b0d032
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IFBKT934\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06