Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 00:22
Static task
static1
Behavioral task
behavioral1
Sample
08634ae450f4f17cb4101df17c72f958.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
08634ae450f4f17cb4101df17c72f958.html
Resource
win10v2004-20231215-en
General
-
Target
08634ae450f4f17cb4101df17c72f958.html
-
Size
68KB
-
MD5
08634ae450f4f17cb4101df17c72f958
-
SHA1
be5173ed8dc1df9f81f9186f73886b85c569aabf
-
SHA256
e56fc9b5c8038012853170d585bd65973459eef22c23683e7aa8449e7759a00e
-
SHA512
f32095c9dd13041010790ce7e4952814fc7eae431594009efdd271a9897a7cddf0831dd946424df14d6fad88f2a92943f81d31a72c14efb018e98fb14c74be49
-
SSDEEP
768:StO0hqGbIiP//mdvsYSgLj/DVWmTMYq8Dfr7Vq3t40MSxjfLD+PHgkyMrj3DZ+/M:StCzIk/8ltnwOH1scY15uaCducI
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410093106" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23FB7EB1-A6FC-11EE-AD90-6A1079A24C90} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6018a215093bda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000beedaf952232143c47d58e49d646b38d5dc39c672f71092ee0e511a4aaf9d55d000000000e80000000020000200000002720b33764360d61ed63d97214640a8863e7c546e7f55c385dea5d9e16f001e9200000005941f3c50548e64cf787eb2056bbe5d2f7d6f8ab6446cdcf875422f7e47cd7df4000000093bfd62218b77e96b527805506ba3cb7c69407d8f48ee7f2e09fa37ec0574af639fff3656fef852f251831a367ac337afa92dd8e6bbcec99e37713013fcfbe6f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 812 iexplore.exe 812 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 812 wrote to memory of 2652 812 iexplore.exe 28 PID 812 wrote to memory of 2652 812 iexplore.exe 28 PID 812 wrote to memory of 2652 812 iexplore.exe 28 PID 812 wrote to memory of 2652 812 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08634ae450f4f17cb4101df17c72f958.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551e5ffdff99de1573a4f2eb508e5449c
SHA1bac39c52a2b0e6f0356bf7db091876450c7ca266
SHA256107e057b74bee11de4743aacd11bd1f22eabc326fa8a59fc50d9ede8b8beb5c6
SHA5126de3a6629445933ef59b36476b75dcaee5fff9bb2c5399a765ab2b4273613696d972fe4b4eab27615327afe5805be80df435e63be1f4b2b3f5e7f4be6f37b5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532a930d222a8ce42da08d02445027ebb
SHA1e8db690b2c492088bed3180a189a58f7ea41a1c3
SHA256a5d5c5de2d5a5f9295cba3d5259363e67c351dfd4d8a82939ab7f7e1afd16877
SHA5121f4f6fca5832ecc75156a755753eb3e8fb64134268f448ad72d8f0cfa312b8e75624a3df41380ba8f4165cc00da167d116a708b0463cfdde8f384b0551b504da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5692269bac50522308f5290e8819e8f48
SHA110a0943f9c6e1211618e6d5717143725d9b807d6
SHA256b1e648b197a8ba711bb4674d837188b41050729d732a9ce8f06ca69e559aafae
SHA5126ef5489501226cfde27d16d343e6a9042b28836fdcd09a621e87c6b69ac243caea6ffc11c539feb80c801b021b2f28e8ee4e8975d94eae31a025b887e0b81af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565fea562c9c43adfc41ff01720951f71
SHA12ffe34ec1fc69ace4a69c6f027e88ab18e16c214
SHA256844e7994b30f4a8c77cb81c4bef76285eb8a2c21d3ce6ae4c479a6305c2fa5cf
SHA51257ccf8d1195dd4b5b10fc208eeaebc56311c727f0b4c56081b47c083a3924b7329b2ae583025b8e072f5dcec92c0d0c4109b5f33e16cd2eb11976b0c6247260c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5326740a7b02c3843957b781c952d1de2
SHA1a8689a20ec269bc6dd40b8be7e7be9963cf3d504
SHA2568ff47cd1d730d0cdd7088f56b85bce9e969c2c7e1a55a3aea612a17bb35f39c1
SHA51210466bd65fb0e7e9f23b7e43169f524e7e09158c2e92ee72ba64f129219ceaa35ae05ac9b8e3c06ee0acf01897418fcffadd3a34a94343502f4e57dd984f6397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56382f18ac02a53a92286ffe312c45927
SHA1640a1618d58da2f103d20c8c769271b78c0fc3eb
SHA2565e7db9d5f07145194d95898738e24e152355b2912f1a75363425f478bab6fc9e
SHA51228d1154ccffe9530636b70b50c104cc078834f3ceeee1ad83e4e3f5d3f885f21fcbb6b862ac9a9e157751c932b793edc197a80c5f0f5197934cefc5ae287defa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0b5343a9f32c5e611b07dc1502571bd
SHA1ea0e800f0a3ff3228a6d5aa2046f699e050e558a
SHA256decb23968bf9dc27f68c32ef444e9ac1ed9f5ad798e4ed080c93167993db7bec
SHA512c2130819e403cf824fad8c7744184dfe71a3c4104c9fe4ad79418cee733fe4df100eacc0df99ca0aef571690477f222840e5a1336b22f772736353bcca56b542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e8e81d06dbf84b323cce3268b6234f0
SHA1b158d5220ddec196bab764b5c253906a738edcf5
SHA2567919d506c38d0871b0685ba79ec93de3a804ee5f7fe43ea7c3caac3b4890e9db
SHA512bfc530f5a5ed8c0688e5fa35c69476013e4688629d3aab40d8566cae5a20536c0f33f57ec6f34598a097c0eb35ab1f9b6a29fdae3d6f52f23103019869d398a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5918c276d9b41186668bab137c2fc0896
SHA1c15b03a8b2372f9b3ade4ddcd7fc8709c329c991
SHA256d471b139d8dc38f210d3191b261de1ac73e0105991d6ce468d76e1ebb0600463
SHA5124b748da6d63833b53f8c29cdd50f7fe67f2ade253c84aabc33a9d638e64a0bc8a9932671277a0ad5a15fbb3e51a17788488dc543cc4cfaa2164961be280cf34d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539b8efbc12ca787267b43a857a48fa77
SHA15046ba34ca998bb817045410e0de4365b00aded8
SHA2561af07b90d607114604108677709643cab53d99bd5ef06f79d5ad1794b984ed84
SHA512afd66865714bb11d27e526c3996da82a8c6428792541d2aaed49c360975e01b1859929b7e9e0b3180f30e0d6d5b20b3a28a864a5c5955fccbea7c6751f4b3ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5588223b0687affc0906c1ff74a6b1d7f
SHA1e7769aa81bda5c115d23d13309591acc8ae36623
SHA25631f5dd1453838313f8200305a6b01537b9868309c72a2149d7a655b4eef989fb
SHA512c490fdc890f3871e2432aa0063eb508a6fc70a6504a120a930c67ac611a0203f0438693df757e12b892e815d3e64a8447cedd1e7511d0d29366c03076a4c18d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e71adf24d49e0c5cef256273ebc9fd5
SHA1d8619e55c60541d0c578391bd0a7ce5a51ab9949
SHA256961b741176e238a0aa8d6db6457b9ed9fee2034d84c1d3957c6c3200b852ddb1
SHA5123672742e796e7a26f406a025643f57271491cbc4fcf91067bb97309ebe3974ba2e15a47e127703865ca1ff4038f09a321e56e4efbffb22eb85b5a458c3cfaf19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5788cbfccae89a60d6e724cb416c8d93d
SHA160aa8bd51dca6cb8b027b5c5519e2a093307deb2
SHA25621b2c8f24f0f27f67933811e16e39a8fea6280ac4a58b0461c05d5df3037e975
SHA5125ef5fc7cca21f4a4e66d0e64c7b7af1f8c21eaa731e9d6bfce973da14615185a611037427580daf207e53447753c89d6e7c09a9f94f10d51c941ff97d1899611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b86faf64d37e60be52f65c31355475f0
SHA1ff1736a1d34fe4ab9a66fd5d53193b75e6661ffc
SHA256731e6fa1f3886412fdaf6da815017659516da5d982f03dd5c69dd8881635a38e
SHA512e97827bf57cf2823ab56ad87678fc81d711954b5a39c6bf96adb6a23906b76e364322c4a9358a41efddf1ff55941a9e44f446b2b79724b5583ed2f2cacd7d57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540220b633d309ce3ed029eb5fa7c6f6b
SHA1d7cb17b72bfe0163d6a6a5928a8e997642304694
SHA2563817d474a02a8e1fe69685a3c409c31f6f426366895c2f3403e4c57b3d0fcc1e
SHA512e5783613dafcb5fe6ec3114a43945fb4a6e3fc4bfc52db6a2b8c2181c8b26ba9e081892e22be453b0c028348b123416cb71e75b43d444a7c7cfb0effa26718bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea1c1ac4810f9da5e3aad063dbf8d4da
SHA18cb9e099c1eaedbf9a5853290bc89b20b2733a6e
SHA25668fe1b73c3a82d172b90d3678da7f96200815398e947a778cce61417a46ac498
SHA512340e38f91111310678585aaf35ce8889729227fa47dc032fe9c617e7193992b9884385758bcaeaf7cd752d583c69d81ce4ff093c46d1d0830ae147121f333f69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d004d72f638e52cff760abbd78a233e5
SHA10bd09af5d352dadc9fdf0ce63f24464d3e2b5ef6
SHA256ac04813259398f11b5bee19b621e1724d1f9f82bdc98fdacf27415d30aab3404
SHA512da03d2b727d833e8ea55591dc3d8fde298deed2b7a6c67112283b15e5e4a157c2bcbaf75c2c822ea8f71c86f654f8e3c5c87aef1fd5e385cc08b5d58e3fea2e7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06