Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
0add35c095f1e7a55686c0d5caef35a6.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0add35c095f1e7a55686c0d5caef35a6.html
Resource
win10v2004-20231215-en
General
-
Target
0add35c095f1e7a55686c0d5caef35a6.html
-
Size
3KB
-
MD5
0add35c095f1e7a55686c0d5caef35a6
-
SHA1
f145f359332493a42876034694be88bc538d1136
-
SHA256
fc93bc1d53735814edf982eb5762d8af9866acf5c941a2e5ee893b95076769c4
-
SHA512
512a77f186acaf7586894bc12cc9cf5d6b546353611baa4bdae4d251d312a65a0eddff81cfecef75df4161b74609c1cdaf3ae734e4cb52b0bfaeb02eb5440503
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96799DF1-A724-11EE-A29D-C2500A176F17} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f0d379313bda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000ec836e6c2517392e9d73d834d75433d152453f312fb2ddfc8a96499790171b39000000000e80000000020000200000004b2a9e44f73defc284ec47bdbf969b34009cb6f2d564eec6d44363f175c4044520000000627bfc704b44549366bc113d2a963de27bdd11d9823dfabb12db432faaf500a7400000004f3cb803701f9485062ffb31e939dbb78b0987534e84cbd58d392110bf9715ee8a7476eb3529b0abf4397d2384fd74b9c8993306e43ff911a64b764b0ef67411 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410110476" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2508 2192 iexplore.exe 28 PID 2192 wrote to memory of 2508 2192 iexplore.exe 28 PID 2192 wrote to memory of 2508 2192 iexplore.exe 28 PID 2192 wrote to memory of 2508 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0add35c095f1e7a55686c0d5caef35a6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fab2929419fc472a46921d327f76737
SHA1c7e097122e190fec9afa2662439a73fabe5a34c1
SHA2564fb0e3441b76093fdb419e0b22e917720cba36036adf29655334daa85697c26f
SHA51248a6e717bd1db47462da86dd426f12021eafe5ea40a829bba4b978be114df47c4ed033ef321c3ac9e876590606562a8ce8adff0dc013515146063d45d09f5a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bd722c4696f7251f94da9eeca8f2987
SHA11fb59f893af82daa04522120ea3e985fab4b055b
SHA256d03dd27475fa99687f9bdf42921c9a6425ada2a5e25bcb4c98a8c8434a49ad59
SHA512f80545fd6ca9b42b6fa5f9033ec57a912b6d09188dbf55db259ac1c77c154bc9c8a3186f50dbd7bf7bff822d47b62a090c9815a386912af8fb6b2831e25c0aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57057b76076bafe8271ed5e4abb977454
SHA1eb70ffd62038a9c2b87527f1df4b3b95b36e82aa
SHA256e8898b4f90763f1d04589f53341f6d58927135251cecd7f920f51bd5fbd580b2
SHA512db983db790054bcce51bfd002dca93bba3753ce1cd7bfe82acceb0e2406103c5dd176967a713be9d98b95b1eca1464efda063b18c41eb83857e7fbf0ca5a7b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5202966cb3512d4ef3863fd90c5206a12
SHA15f211f494082dd427f91653d74bfe4b314096659
SHA2562f8bdad34bcf196312c0436c65b404490f6da7d9fe81ed4d6635dc7fc32f95d7
SHA512851cec405e3876afddda774281f661c0b03169ae3c51988e0e3773f9e615ff1921457e03d658c305676c3e1adc93d4f4981c2e1a5447c6f51e0d7560fe85e628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5010cea327a515faa6f269c7e158067f3
SHA146c4e167d6501fa1444860b754f2017f011b9c8a
SHA2563187320919473cbd2ec71e14f233f6ef0dd4358805bc94a1294a7c7b9ccda2a3
SHA51294a6b1433f9dc68338f563b679fb57e47007d6c3644dea5bb44be54cb063744fae0531b5becddf685d82e64c97c837491b7c9a379aed99cd9dd91d54743d661b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531c15ef04af230f73cfbc9f215c14fa0
SHA10c5eee16e60025658ab94b632c2fc96212c6667e
SHA2567c7359f71b8f061123ab471b6798a2a2d29be94c9aa9b6d90d418907868caf8e
SHA51215ebe32ca3ae599f929379fe623dad7e658b242a790ef2103d20235d330cafe0677a37e91d8ab6628b2627b9ab796f0a07a0c7834618a8d681065ccea0de9486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546e70359924ca0a9934187718a87d2c0
SHA163d88cda9840cae788e16f8ef3520db09079ef52
SHA2565cc693605935942c190a272410c41b31cb92546fa279e7d379f55221816be386
SHA5129c111cbc60eb33acca6762556c502e4b4b12d6c600491b38ac7b1a72e2f3722dbd77c4be4320bf924df7a2198cbf8e77bbf2d3938dcf175ee686c386a8fc3c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edf4e41dc4764f9662f32bf6dab9af59
SHA12c7891943a2a6bc4e2df23edfa1b80f5cb636feb
SHA25687e290fb23077c6d7ae3095072ebd095057d3460942ea6538f7b86f668993184
SHA5120a56705a858e1d9ddad1950129ccd9555235282032ae8b86e23a8fc2f3700b200c95c306ea1910685977bab9cd296b7222fba6d7144dd7b33bbbdea201f48eb4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06