Analysis
-
max time kernel
118s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
09888c839be36baae812e6dad8b13283.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09888c839be36baae812e6dad8b13283.html
Resource
win10v2004-20231215-en
General
-
Target
09888c839be36baae812e6dad8b13283.html
-
Size
12KB
-
MD5
09888c839be36baae812e6dad8b13283
-
SHA1
98fe951f86d2572512a5c7fc11f8f34fedf3a597
-
SHA256
9f7050fbd3d9ec530597c2e19e554ddb8b39f056266e729cbd7c8582ae967960
-
SHA512
12e67c58ad3dfd4cf0dc25dd353a84c67ef9a94e7850ff07837cd68f2272b345440f432f6abfea63bd002f0c3a9510ab8914ee1282db44732d36e7b999329f06
-
SSDEEP
192:g0EeI+oEjzURsm+V1U5Cm1iz9Pi7cB6eSB7Zn64OAw4LQ61+h8VQjmNcWm0mI5LU:MWU5CwE6eSB7Zn64OARLZEh0YOhBZ5LU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b0bef11c3bda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000001745864510e41b67a63929811f892d83124f25e3c39338471fa30409aba8672000000000e80000000020000200000000231ecb92cd760d8cea055653e0174fba44f8c5a16df0dafe6d38587bf4efc1790000000089bab74b151d1899cdcf73cebf1834f00dcf32269f91180cb3d1586f00764974fb4a2662b3aa1f75e0e1623a9912f79724e524cd2f78ce49259d666aecd77122a5df5db699e42f127eb1af4e6b1f788189e8042652cd405f64ea1dc226d09be648ce66d98c2c7957a5552e0770e55d2bab4aaefac0a5da3e74862e1ce67329454d4c7981e9732d6ccb38222c4517f73400000005dda5a0690d51c091c002096eeef289eace545af2be0ad4129627e2e10e782fcb69cc0d8c3a5a7c67b324241eb9b2f3d1db6d31b2a04f250a6ade304bd1f500d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1BE0CA01-A710-11EE-AC0C-EAAD54D9E991} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410101688" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000084a11d6f68ffffc7e68e96ea48a5bb386255bff06695dd84b889ab935f5f82a4000000000e80000000020000200000004ab26d15b5023b5aa87a5aeb1989de67381acb521254ab63582c8135573a0297200000009c4b9cded09c043813aa0f3b88017d0a13f8211c5cef347d1c0a045f11639c9240000000bb42f1f11c8c1d0aa6402baa7dfedf3efd531b078849c722ad07fc3eee30a907852315eacd0d584092fbcbe2f9329fe1b82ff2ab9805f94399e138c871d73ce2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2420 2652 iexplore.exe 28 PID 2652 wrote to memory of 2420 2652 iexplore.exe 28 PID 2652 wrote to memory of 2420 2652 iexplore.exe 28 PID 2652 wrote to memory of 2420 2652 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09888c839be36baae812e6dad8b13283.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5292d9ddf510cc3ede0f490e05c0cac92
SHA1f7b9780380404aa009bc4fbe45c25414b67ff43e
SHA2561fa47917c973653f878056334c4ad4b84cc0389e82bf212066ad7eb2fd921236
SHA5125b6be690d16ed068db683d961bcabfc2ea5d3e76d9b822c058a0efa60b7e08b9aaabda21ed6fdb06bac786beaf1b50dd2a86f21fe88de2d7ea0f27ba2bf19916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501e057019bdf57afe6f9d4a717a01146
SHA18b381f455551d4746e2e3e03035d3df60b229aa5
SHA256f8575d01a87d7be47bc3a1dc3b56ad82345e186eb98cbc6cda14bd19384defe7
SHA512a4f24b81676e6cf8534c03d07d8fc428df31172cfd72647bc5b31072384a07aeeb25fb96b59dad67be19879f2fce4aa1bf5e05a472bf5a99b31352d53214952c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bf1dee41e7cac4b3cb949fba869e0f1
SHA1b4367eb616a735edd54517df0bdfbd26b4f44df3
SHA2569544334e86a21fd34aabc61c3f617161175c493f844c4e119e868ca3e2788f5f
SHA5128562c0fbf1125e549cba1508bdf7b25dcf1598dabe23329d5766e69b9b4595c9d95dffd75e5cf1d4eec76ce82397ba488a4b58edc5e4100ee1c11a688a7fe278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a54ceb4265693bb4368a809a9bb606af
SHA1dd5379ec47611c6d89fbc2b67527eb7c9196a382
SHA2560e69e66a9efc62fd770647ed47c3f207039e89575e19aab9b5932043d8a6ac32
SHA51257271172a204d6c9266901b312eecd69e249bf6ef71983ad4e71f7fc3288664c02a76282c0ddcbde829b15addb7c4e264581d70b01b03e6f19207c6bb07461e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eee2d3cbbbe9a6c61022d51105a4132e
SHA11f6db6679be2dc1946d874996500b9f3d61427f9
SHA256658873f61685c8dcd68cdebd1a5928f1d91d6ebc3ee230f6211c9971bb103242
SHA5128f86f5bfacfd1d963d32292f04306b2d8b40c81b69b04dd64f1166f2fa27f6bf275476cc4ba97cd596c366f53d7c46dcbe3256220a6c913b47e0ed99adb0399e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3f6907d6f229e77124aa04607344bad
SHA1df86aea4bea5fea99c8e219a8d72fd9da750fdea
SHA256820bb9d42991eb1baf1278c809f5c026b61d65d0607d8d5f85741a4b2eafa197
SHA51244fff3d80e5ee948a607a8220b986515970cd8264370e63c3f671055ee180a188cb3487b12f7fab729227c6f91c75093ec25561f53976a31b26a6021a0dccd44
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06