Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 01:28
Static task
static1
Behavioral task
behavioral1
Sample
0a0c194ba94fe5d17124bc041a208374.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a0c194ba94fe5d17124bc041a208374.html
Resource
win10v2004-20231215-en
General
-
Target
0a0c194ba94fe5d17124bc041a208374.html
-
Size
99KB
-
MD5
0a0c194ba94fe5d17124bc041a208374
-
SHA1
39a83607ae63851bcd663b2071a95560c76ccaa5
-
SHA256
7496734dd548a7e4677d340d9705487a77dcd7a9d49bc64b3a8cee4bd6347de8
-
SHA512
e068d103d173772f20a3b186fb6d45fddef2a0d104adfa094f93fff8d4a6f21e9879edd92d8297fcc48e921aefd0331b655c21e828378c3bef0a79acb473eed0
-
SSDEEP
1536:WJV1+B4yz6GWuRAaHaG1WJGaXASjaU7pxDG9lE/LIMUmNL4cUZPMY:61A1b1WJJXASjVjDG9lE/sMUmBUZPMY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000008bf996fd0332ad591044d7616f82911a68774af5f1306bf39682b80336d26c94000000000e8000000002000020000000573730a422a2764eb669327e3b31425089d1f0e4e24cb5592fd3c9ee72c9991a200000002509e77286fd04f9e720b4a57eb89c702c18127b2c690354a3ea5cfce7196b55400000002b757aa5c781807888daf08631902d043c87f77961d193691488a2d79170e2cd13ba1045ff1a98d32bee76b90de723891b3b7382e5254d33c9606f27944c932b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4425B61-A78F-11EE-BA23-F2B23B8A8DD7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0cf6dc09c3bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410156574" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2180 3048 iexplore.exe 28 PID 3048 wrote to memory of 2180 3048 iexplore.exe 28 PID 3048 wrote to memory of 2180 3048 iexplore.exe 28 PID 3048 wrote to memory of 2180 3048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a0c194ba94fe5d17124bc041a208374.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_C7CF4FA7BCF717E50C9341D69112D7D7
Filesize472B
MD5e1e3d9da0a10c5e46fae62a87dbd81d9
SHA16da14087c9a9f69ebce85fb1326f906a09b68306
SHA2569e490c4cf79ce1f5abc3bee4e02c5f3c24f64459b5874bb461f087dea4d85c04
SHA5126ccb62d6cf1f503b5a64795546e1fa8356ed71c9daa572f1e0c52c764bd62564ff7bd6fda777673b9d07db14c2c453725da465e1344068bb8d7d522be3d7cc09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c898c90818047e6ab36a4c20cce9c64
SHA1404c4d9fae4a566eacb04e38ced8143b7eb1f4d9
SHA256c49b02d1160fbf20289cfe76d494b7657f49bb33b9feb3a719979ace587a0d5d
SHA512585aa6dbbfdbcfa5aa7f632cfbe2248ca2583c93a2c27d2e8d154ca3e1c52fa6099e612f7924d4b852868cf31cd85d1d63c92da10d5a12b80b2607626fd899f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c70e58495860e720ed504a0c7a2fff6
SHA1a988f179568d7770a11ba770d794fb057247fd59
SHA25628f57ca43004eda6bf81b20470184f3195a9787638a9d5ad9242641d0d2468b1
SHA512297c81f3cf489544ee0a8ebc0e7249806d2f36012c0c40c8cec365b8eb8c4b1bde8b447491414d498e61cb90addf599ebc5a3312886ddc2f2562fcc55949e4b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceac802c4698e6d03ffb7ce5ae309c77
SHA1f54f0e93ce10090fa928dd7c9a6631fbd8f5a6db
SHA2560e87287ad8c1d6cf397c76f7303a93aa9d8eee58f1c1c80dacbbd17febb6942f
SHA5125edb98924b2a8208cd6b53d558f60ddd8be408bcf11e8dac9af74058a5ec4ca1e2a7abefd6cfd6eb4d04c3f818a275a25468f15e82ce2765ce545d7cf21651b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5048ea91b7afbef8e2a909fb27d6f7e6c
SHA107e0ed47a57f6c1bc1d16360b4f724c7dc3f0d20
SHA256d3a48e2362dd8d937bdeb5636ce49b760aee73dbbd2f0f48504df88fca99b068
SHA512d5601ea70deaa45b46fda8ce6d26bbb9afabc36eb87f48e7dd4005d45ffbb6d659ca465038ff26e4f7717c8bd7ef8fb7cf0e4172c8cbc17957fab69385c1e88e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535ae258897a92b9a578242fdac496837
SHA1d40748e9d4209081a0abb122d08d36a79de25011
SHA256ea246f4103e9380cf84b59bff20ac98a18cd7b6061f9107cd3370c42f0824b18
SHA512d0b03be04499fe13b849a6ca9e012e77e00ed30c1f35e19e70098369fec4990b5d4699a9f48ba8bb9ff30bfbb2f967a81b4b4c67459318c4fb9fc94bae71d086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d80008756c93ca0070e46ea642aa551
SHA1c2efdffa66ae681f3279d39d1bbb3da60049325f
SHA256f9b54381551a023edc1400e7d46fbb015770aa072c49f74f3bb0d79a3013b425
SHA51243fd4443241e15d4518f85e2438184549b89fe6770f22e95ef3cf4f3df7b1821f10121ab6d1f133e85b3119fa86bc7014050dccfa49ae669f0e50a99fee5b1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d103eb01c75a90ecca7a2011a5173af9
SHA15e05fe6ab8302a95ed430b86a146a21fdf875e07
SHA25639193f52b5af4d88667c5ecd19b90017b21f5a5c9c716bddc71228e70b143cba
SHA512b810db5609ec26f9ab4d4606d1ba27dae72e31fc9ed697b040c18414866695dc5fc4a473e56f5f297e0353db9dd920cb21303ad11584c24e6bf311a8496f3060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d44c9e54cd0a39ad975160cf4801b387
SHA1392c209b0a4077fce4ff25a0e8e2dd3a7477f7dd
SHA256735c477760b2c4a9cc7da461d0d3cb71575773568af90e437b568bb0162a7e40
SHA512b10d397aa5dcd88a75772a14aaf71e60122de8914d892daa95a36676ac52e018a22ec5fc584c6144666e65268f589a7b06ad79d558b1ec923184885ba7025524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519c22a37bbf0bdb00edb988e050f3b10
SHA171fa58a76f14c7ebe60b10a942e59d3b425eea8a
SHA2561fb66236531c663f230e2b769e280fc773cf65c089440f7f3ce8b78e650d4771
SHA512b020122733480d05931ffb3b08ac190df2780dd03483f6bf4fbdfaa6c811fad2053e5c686b7ac6a82925e4b793bac1116e6a28afb2da7bd2536f3c1d988aaf66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544fbd69f6746df76021ada14e2d4a86c
SHA1d9c05a08877272347e1cc8c1712c4fd2a21cadea
SHA256b1e850d362fa8cfd28fe09d0cadebc4f4d5da12af64f6a30238c5e4048c6e036
SHA51244c5b1649af0628980bf4c9b09c47462473f74b9ff3873e53e99a7bceeb698edd1620da7f4e214cea6e2406091a930f3a9dfcdf45e98a51bfb922697c534f927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_C7CF4FA7BCF717E50C9341D69112D7D7
Filesize402B
MD5c0ae1581c6a9be078a24d75b4075e8af
SHA1ad564cf7905ef45cc5c04891585c11f945db0555
SHA256030d8e22b24bd4b4fc12455449ed28ae4aa80770a9a38ebe17406cd054f9419d
SHA5126ffae9eb1861e3936910adcc480e8b0d5f848b41ead03d4c654d88d7b9358cb33386c0240c6aa7162e5122426a15b11eee5c5ceb8b57d3174c3ae21a09d92593
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\cb=gapi[1].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06