Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
20a3b9c17d848d034675c5bdbe599602.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20a3b9c17d848d034675c5bdbe599602.html
Resource
win10v2004-20231215-en
General
-
Target
20a3b9c17d848d034675c5bdbe599602.html
-
Size
2KB
-
MD5
20a3b9c17d848d034675c5bdbe599602
-
SHA1
d97eb79f22be6b06783f3fcde6a0172249b435bf
-
SHA256
770e26250bcaffd96dfe89873bc324721684986d6850a550134b72ddcf6657c8
-
SHA512
7bf4e4ed980d4daa326620719aa351e836a54840666a2a6260618e8694a6036fa72863530602f0d6e253b0483b78598e1a043f9f03d84b3d52cef6f6dba1300e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50426499b63cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410277639" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d60000000002000000000010660000000100002000000008a44dfc2e7aff9e437296f0752c48fd49c67f43eb3ce7bf6aa935d55d13c078000000000e800000000200002000000007db896daa1c6c98f234310fa18b5aba78749aaa0596f2cc2c1f561c3678280c2000000080c47651fb6f6d1ce34d1665e11f9e3a5ecc73efa65a5092d55f7a54cc5ef41540000000ccfbebc195b7e43952189a50d67d53a486bd90b232f1c13e2ca82ecc703e0e4d286db5f06eb056ed53df0660ff41200fa63f5a9cf41d004b57aaa571aec95594 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE6D1F91-A8A9-11EE-96AC-DED0D00124D2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2804 2120 iexplore.exe 17 PID 2120 wrote to memory of 2804 2120 iexplore.exe 17 PID 2120 wrote to memory of 2804 2120 iexplore.exe 17 PID 2120 wrote to memory of 2804 2120 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\20a3b9c17d848d034675c5bdbe599602.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a3d389aca64ae162d00f024301f81c1
SHA143f9d07b481bc97495c3f291247cc6a2b0e56d73
SHA2561d746bc8fcc462579d87b39939d31b393159446d651ec52dab0518af010492d7
SHA512ef3e777951c70c50c3d4d43375d02bbf3651e9a3326a346bcab9f4f0ec47b94489ed9647cc5f21fdaaa757a59aa5304766dd73ceee8ce03b62854deb12daed5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535682b2e6e14f18cb3e8e1ad7fa59ac2
SHA160e3711f4e31e7363014bef290ec6c9c198c4647
SHA256ece4142791f3fe1ff5a16825eee1b65f33e2c612767053b2be10b266d8009718
SHA5129901b43912f5b01f54829531fbfd241613b6fae616b90ad697354b07baa1ae09ba6ebe4d1154e890f99e20a0fa1355f74168f36f68f1cbc5f9d67e700139fc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517d945ae53d3b22bcf1bdbc2879616a8
SHA102908d207a4d1d62b01032896584251bf17d3e5e
SHA256d9559f713d357e5b302a568c37af43335cd3efe9106b713f93a7e570bfccef3c
SHA512ee2ab27403cecad342ae1360d322d5c1a3d201c10a80fea1cc0e830d47df0b3988c0c0c0d8ec0e442f94104936398877103e1915ce74270d4d04087f3f878a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b43d3f24a428c3892abdf615623f4ddc
SHA17372553865d4d2dca9d9f259d88704beefb64468
SHA25669a746301d85651c663dc878ada333d9b8e7cfaed8eb045230196006af55dab1
SHA51269f503bde2a555c1903bc7b0ca2936ee88d96d070afbbfa79dd384cf3f14a75e9d6092338da65bd189b5f36e32d59e0f1d45fce111e0ba302273d7ac1db98fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526fcee7d41ef6331b499fa235d5185c1
SHA1fe82ae2bf08777d6c52e1b24b1b7d5273d572e17
SHA256978ada1e611101a66c201593428ead789035187615caadbe1ef0b124a0713fec
SHA5124e328812820dcaf33e5cf0a111323bea07cc5f3b780a6801b6064823bf9a26e3829b2a860b26000ff7799ec1922c3f318951fe9931a7a5e5e5d4be3038e6ee0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5531d981741251c85f89449dda411613e
SHA1a9f7a709854ca5968ed1c6adec4bc72587326766
SHA256d658cb7c61044d018f97c4aeccfaf6bfb0d394fc9944571b43828b82e56bfca3
SHA512afa3de21b1586132d243ab93f765ea41206d059a5a3c29afdcb7101e217a30d8ddc6390d0d89282af669d543021f3c22a9349011e991b9be2f0ed98ea2e752b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5739855b27ad06ccc77997a43ff74ed57
SHA174cf7ae827724cc8f05dccbcead260f8567deac5
SHA2568c463eeb42cf94f6034e065ffa9bd57129a6a60aaf101f7d964ef2a5659c5868
SHA51231706f7a8afcc922b5c85c06d118bcfbb2544870bd378e6805f673c4040a3a16a4ad9a272d06d4faf979b870c6e3f6b16f8ad506b102e501c55e6dae7b5fb945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5723741bc36af91c4d142349b6d2effb8
SHA13b4d9390fdbf25db3fd917bd3a345c46220d9f4b
SHA25652f3e1cf7cffe4cd2da8f9f8a51d7fa73b140a31d1495a63d820b9feb4076185
SHA5126a94baf0f97be8b5a73de17c2339eb3c7eef58ee51f75a2d21176d63e3a76cd4626bc1d8429831af67543464f900d3320d12be1ac2a7b2505318eb1bac4f4648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5ecf8bfdbe7d988203cccd0702a7627
SHA137400ebab9088c3d370400120c771cf31ba1d7e6
SHA2568523d91316ed6ef87b5296d7e9bf184ddc120784ea0a139f73a9f39ffe16832a
SHA51276d50571e1625ece3940689a6be177bff3ae8884ada8ced3f649e0f7559845cf228c9efccdfc4786c90a9d3c2350530670f14518cfe41be82534d34f4915d53c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06