Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 23:32
Static task
static1
Behavioral task
behavioral1
Sample
201b6095fe80d35f622e5bac3ffd2078.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
201b6095fe80d35f622e5bac3ffd2078.html
Resource
win10v2004-20231222-en
General
-
Target
201b6095fe80d35f622e5bac3ffd2078.html
-
Size
147KB
-
MD5
201b6095fe80d35f622e5bac3ffd2078
-
SHA1
5d0350d47bd50f33ca83740846c7cf3512a596a0
-
SHA256
4736384dd069ccf3f857f27048d054dd4f66539f08f8ee60f74e7f09cdf468a9
-
SHA512
72a9d6288c4eeccab7e52de6a20b29a25f1c9468364f83b5c5ef2e4848e0464b8ebeee0511121535a517a4e14fd5a7f95fac9917945aba64f889b66f54b52902
-
SSDEEP
3072:3dosgjUab9glRxglZPszj6w4nwEYBIf+0eLOnkYc4HsqWd7M:2nUazbkHnAHYBI4qkm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c7fb5a4e3fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D933D31-AB41-11EE-9324-DED0D00124D2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000001f033226d8d797e79a0958991f8f86b6450e08a444bdbcfd8cbef26b92937a44000000000e800000000200002000000035c735703905487a68d0021f6165f3a8d92a858c678225ba2b5dd2bf9a65a10120000000cff339779cf0e09e6b2308276c860343488d76b9d7c72d3f904693795d869cc340000000d7497e3a74b5c545f170c523334c4de1b5e111db05e5de1bd70682dae862311ff84fcaa8292b6d2078eb542fb2eb20392bf771f6c13cf82a5d7cc32abfdb1545 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410562675" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1204 iexplore.exe 1204 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2376 1204 iexplore.exe 28 PID 1204 wrote to memory of 2376 1204 iexplore.exe 28 PID 1204 wrote to memory of 2376 1204 iexplore.exe 28 PID 1204 wrote to memory of 2376 1204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\201b6095fe80d35f622e5bac3ffd2078.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD51d0c58b9598f329620fc4e72e12234fa
SHA199cf995def589abf01fe2829a03eda1f11985db0
SHA256a20efe64a2e8b208ec375a8a674e2bd5cbf16c775a80bdf5cbeb13490974a399
SHA512b0f19bb4ab81384c38ce8740024fd29a4d921809d6cfde54424176d6df035300ce6fb3434727b5244dae20dc78999546d7d5d194ddc9334947f7746f2f4930bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a80c55daa7215eba52b16b3b122efcac
SHA1ce725f9b02b44e6c77376684f706ce365721df93
SHA25627eada0fb5c633a1dc1e22fea49f05b301d506c43bd7e52c68c282db25336a1f
SHA5129739a55e3595b03c5a0554528b6afa7da26c376280dda8cd6886f29b6ad52e92aa9de89a01de258b4d0298ec5f86e1bb49f9a39e0558797e0a67b4bd2ac11549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501e5ecb36cc80b8c89f8694218bc802a
SHA1706ee5bba75401d34294fd897c4ef5f7e012318f
SHA256f4aead68ad7cb945bbf2da652e05fab220b5c63b1c4feae99a5324e061c1e450
SHA512e905003990c27feaa9d255dbe2f81b3504316db0c9ac875dfeb10bb0bc26bd8866a12b4dbabffe62c471f9e8fc8f57b257db66262c80b25861d03835e8afe686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527a27fcdea3c54bd038bb873c078ac0c
SHA15531ff9559ccf3a0fdeca6446797d45fe7808892
SHA256d67dd376d458b5ae8484eae860b8a70bbadbe7df1748ab129a972eb3b36f2cb3
SHA512c39752ef0e172c4146a18a833bfb2897cd0c82a60eaacb2b7e2328be23df6800d72df3e04a8896d219cd6802a25f799663a038250c5079f8e463eec75b107a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5588c97affe455cfc7680c38500efacb9
SHA121f244478616a69f043a8e6c7e92203927461dca
SHA256057860a43fd540a8088faaa6eae7acc6ef419f3a4cbf826292951e39e5af5e06
SHA512af29be21558c2f8949061d2e3ebe82c3bd0dd019a325d240621a89b04e0a843527338db4931bd341ea970ea9b8aa96acc1f28ecff362e526ae65c9a8aed25f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c7265e99e13a4df1892ae5601ca0fc7
SHA1cf87f923067c57b19ae53fa550d1ee26246be6a7
SHA256c87ba972557435facbbdedf437fac3bb6e243b9b60bf242d1c9944fed376b200
SHA5124a6f73338c321c2a83bb376a5ae49d442e04497574bb05bdcd569fb50d802bdbb08a6fe3cccd798f4cef20df50b3faad9be5c73819d2e454396b338c386d909a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d809e2fde2825837c50dae916f6d513
SHA10d101af10ce258a5c82dae3d67335bf601ffb82f
SHA2568ecfcbb7a457588308d10f3fda14d8cd05ea9733c21aa52aa4292f8e29fab6d3
SHA5129eed268f1d8ec1d24413facc99785e676ee3d8cb4b1c5067b798cfb8006e228a434e806bad4819e610149c44a83577836277e292de7762bafc8d654d720d035a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53070d358aaba3cbdca00407896dc8ca4
SHA1091e49c4b341e02230c2a6579f07c767eb06d5d7
SHA256d173833420875cc6ae270bdcc83c040952fd031dab1e52b174551d5b09f7e284
SHA5126ca51469c44659c42f2df15e7c365f0010fed966654a170a1257acac08643ade9f5e1c770c57e90f86a46c1ed906ccad9b29dbd959d69acca2d75ff460e0c76c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542e6f6f645ee2658db52f195a2c34979
SHA193d739634c9bcef811248a36e6737024129af69b
SHA256d3572ab269b72d56ffc724cad473a57429e61323d87129ae212f755e0843e2ee
SHA5123d331b37ee2ef268420b39cb3cb37b43c888f6b911240e7453a88ce8eab9aa20d25709a8c6b41bd08120901e49962940aa80c88c8dad75f7cddfb259c4c2b00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2a0db0354df6340b4c51791718f0d72
SHA15be2eb745a5b5856ce603cfc620d75a9fba679cc
SHA2560d46dbba97b696a05ce9ffdab58761b19b407f8c91afd28213f0b0166cd5b9bd
SHA512aaacb50b4205d3d76977f88686a42c810ad1cfb52fdbff090d435cf2316705eefee8b0cc2723d9474cf0c379a5dcaf30f7738a792fb2186511222c287ffd1a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aae97abc679fcfe1e247f46ee45d5eb3
SHA1ee18275a0c2d91873f94e36e7093acc2a76631fc
SHA256f4fe32b2ceccbed5b01f7859296d08a24d45bf52165010c23736ae3df6ac5a46
SHA512af2ab33c4f942dc21c8ce227e26a236d0cc133ab46b4357717d13e2df5bab9e140bf62c04dfa967ea56ef3fff759edb275da9dddebdfff1e78683fe1c631c948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5516261aeb962061b3c8b1a506eb87da1
SHA12ad4c306926a38dc4af653819ada637dc2cec3f8
SHA2561864abe48ee191cc7ee3809b197c7db4a0d3badbff7e41c0c8511e4b9c955d3e
SHA512ce6353321d0a7bc5c28a2e5f915662ac31bb45da953c886559c92315789901e3b3503e8e7aa078a7bd85a14ed3a187bc61f03b447a03be306aa023d9a4841d66
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\cb=gapi[1].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\plusone[2].js
Filesize56KB
MD51944af3661da46249991197817b6cd8b
SHA1f952df40ec79fafc7c798f37aff92878977376ed
SHA25663326a1c4e0eddd3501f0a064b06a2708eb0362f3ae934f53145978d3d0799b5
SHA5120bef19b32be337cfba179ed9ce4533a207cfe645d2e5fe0da9fadc7b01c72704fc89749670d1ac48b8d494675bc62ac089fdc4d8495979226f10828225594376
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06