Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
0b3d56d907aaa0d778bc1001e1458930.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b3d56d907aaa0d778bc1001e1458930.html
Resource
win10v2004-20231222-en
General
-
Target
0b3d56d907aaa0d778bc1001e1458930.html
-
Size
30KB
-
MD5
0b3d56d907aaa0d778bc1001e1458930
-
SHA1
1fdff3a4e90261ba4e24b046c014aa0a11e72e10
-
SHA256
5e756cb34b32adf4b6c064bbcf307a52aa82111ffc99b962c63cb7df068f8229
-
SHA512
a1fbdb140640e3a6ab0c520a8ffbf2043082a22c8e0f11533d1b6d6b2c06a83f94aec8744a3c229e0b8eac0f3da056f2358315e3f5904b034dda12ba752c33af
-
SSDEEP
768:8EG5J6bgE9BxpS8bMUXqWKBjLJ9vsY0hBqiZXdn8F:5G5J6bgE9BxprbMyqWKB/J9vsxhBqiZK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410171842" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63882F31-A7B3-11EE-AEE7-F2B23B8A8DD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000d2f787488f91c884156f0b58aaf698372b02d17e60b9e2a4564bf5ce3c3df1d5000000000e8000000002000020000000228eb081f2ba138ef653083d606b5586dbf4ef52ed031c9e3072d4c8ed60ae5120000000c250ca72a625464db367115e5eee747f6a4de9278b03265d260b27d739bb5f6f400000007eb997bfa57b4fcd47d501ebc17c1f18fd532efd8be6fc90a45306196e5f1297b3915bd30ca0f6de064f62d6b7b1154b022d7bbee90dca1d284bf23dc03592dd iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80381f55c03bda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 840 iexplore.exe 840 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 840 wrote to memory of 2292 840 iexplore.exe 20 PID 840 wrote to memory of 2292 840 iexplore.exe 20 PID 840 wrote to memory of 2292 840 iexplore.exe 20 PID 840 wrote to memory of 2292 840 iexplore.exe 20
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b3d56d907aaa0d778bc1001e1458930.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543c96af0a3c538336bc04a4ca20af7c7
SHA1921d9bd49510f6f41dce4d4b43068555e67f25e0
SHA256a63c5e085fc508f2b4615b257a8c703e52299e72ec4adbf3694cadb5657d2623
SHA512895d5e42637d92a2d92990f645ff13a39aeb1dbbbf8069fd5a71d7294d39b12b86a46124d4af7279a478a611d47884f449c444d2108635057174f04e4de57b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ed5555757a23c856bbc276a744d97b5
SHA1368f98416f7fc31040bb1e52aa4b81a4f2e5d6fd
SHA256cfdff4519bba5434d35623a18338af698c0d52cc6446e5a0a9e9733beb04eed2
SHA51245009f4c5ec88c73af505276f227167e293d69dd5874f6ce0841a45cbd45aed4eba5e479afee28dabfdc6dc3d09c487a90025c2c11b8db42ca5953a046d549bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558a64515a6a74088ecb3ed4c4ccc4fba
SHA177978fe70c1e7c5dd9d9b0732d4f9e5d0c300b12
SHA256459f378aeda7a6bb13a6ef8b184153fec5462fae1526c77b1e8ecd2068c7d059
SHA51223dd1d5b70326bdf0679a9c185e562b695938b6ea0f945fc63fbfd4043e2823af72519283c0caffc90499263040e83aef86af9cbdfbdf724d1f597237ce8e548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548637bd1ec1cccb80505c5bd6ca53875
SHA12ec4b2db6ffcfe849b28dc63438679c014fb2267
SHA2560280e9466041c89fb22f9b68a5121cbabf30f1e035bf0f2a290352584c916873
SHA512d53acb24b30379fcd1e0edfcf7e78cf11d4e43a24ac16668926cc1da3561dc633ac924a4cfd1d57d40aa1802f752d956315b903ab8dd43defbcc86c0d0cbf468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7165371738acf371c3869106cb37874
SHA1c5e614727fd1dce2bec940f43e96b7cd90768d80
SHA2565e10192cee841e432f561a4a049c93cee1b6eb31e976c40d0a9ad8235b07ea7c
SHA5121f11b93ccb8ad8eb6887017912a60b78b9f2ade0b71b419e94fc315e2f64af38fcf4d9a3dbd5aea52ee4b027a631210bfffa013b05955d48d1605a07fcc434d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b179922975c1022a5e76ad92719da29
SHA1f9e1a6247c3dff10bb341ed2dd32b54edf88468c
SHA2565d3ef703bf7c130f65d2b597e576fe3460e2c2a9c715f9fc789680ad739aafc9
SHA5124b4cd1fe90e3fbc4da29447d8fd108e6141dfdfbbbc030ea44483ab1b71855394e772a62741356f200bb5b7a664b0eae1677f7033810f6795abe818d4867962d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fca6604521c4dddbfa9abcf2f2fafad
SHA1b7ddbb15e865d4988bcb052c917d0e895ff3278e
SHA256b03d87d82ca265e2ad6d7a16af1d13e18904f0622972c5fe7e682b0f1412fc62
SHA51268c68d8ef265545c90610159c58b9af6c6fb6f3a743fe4a2a39adc4410b31d7bbedaceebad8fd8096a29cd064501d4d74ecc8a7e9c97b0816cbadb84511b76eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d836e069c1d37fba950a4083ccf68ec
SHA10378972749d96846b56e206d5f83cb27a6277a30
SHA2560dd6a2bf0c9317bff0d263f18f6ef9ef462b0021af87a7738924c180e3a755c7
SHA5126b57a040b9ea278395fc35b50cc1ec69dc8901cc3542d45fdc2d724c7118d86620895479f3e12f471eda96da9eb7290135e7e9846991b21133dee541a93ac0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598ea27ee86ec77b232dc68f2eb393fe1
SHA112f2921757b28fbbe75c95a2bde1161c4ad636ea
SHA2560d9db2474116178bf7917162d31a5fb804bf9fd7f9c90c6931c2c02aa1764bde
SHA5126e92910b37b378d9781f556d5d3f4be95fb192546f12238b53f3ef38ff28926f6cb2ec19a32dfe5d974c1166d5a501b6d968cd5a92b057714b7477d884b8b891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a27d09b8e872271abdd287527ec05537
SHA104b0b585b0c076a3b2e1c360e2523274adf05dad
SHA25640a2a97e7677fc4996c81fca27aac72676caa93465eb97fc653caae4238e9055
SHA5126e83359aebe2a552694dff8a29a190d9315bbfcafeafe64d00751d1f91968c127925e717da7eb4f33c89e568b4a4b80dd52c3813ad29dd5b825df69a76dfc251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f77e094c9c5f9426c4c7e403ca4bee51
SHA1d9974e42bc81a960316a3ea9d4e90f47fb95928d
SHA25673e1825485390fa87d6420fe44c61ca4d773f2794a6aca1f750c6c31252ffef6
SHA512b9cece645cce0332db1ad5fd2784091a8a481e8942e34bf1055166fe08b12a543162a632fffd350fee3e0eb8241653b876f84333b91353f8d289b51e4b520401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592c92639d602c35fa34f08cc1884d4b8
SHA159464bcab970799075c12f790aab93dbe463db01
SHA25687f70ee5cefc6a973ba4f39cc3fc27e1a12bd6a0bd3406348442faa5960476e9
SHA5121d941d1bb252aec74396f4c4252adf6c383a0cb4645ece37e450187aa30d5ec69ee574ebec229046cae2bc5fed16cd2d01b7540fb4cb5a7d2572068a26476b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f8df9794406ff7fdf9a057ec16044d2
SHA12270ae754993741187c794afa166462a5afe9584
SHA256b761b16095da479c0ddf3540cdaa4d9595dfb341ce51283cc448c57e6a4c5b56
SHA512319e0d0a7e32908d5b2865303f5503cddd976c6740c2e5a4c761fd42f3a79b1b72e2543d2f59912d8b57720bc465f5f247cfbe07e2a8d4c4f98540a0ff31e6e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a21e42dda8b50f4df132ca83450f52c3
SHA191919512b0b2d1b204e7e60a901324d0af4929da
SHA256f19d3f6a97e4b68dfca4fe819b7ab68be4291dca04a56e426cc1bc9a08269409
SHA512ef98882b6133d5200addd96f71b8207c8cf3a61f2bad1cce8ee85bd70b18aa87ddc87432dd6c4f27cd132c637d41c58646423f143e6ad59052de3d7f5b79dc0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577b397e526ceaa0f6578addb7c91059e
SHA139322dc7338348dcf61512a9e8644a0ac901fde8
SHA2562fc851e142baddc999866a7b1360937da39001c0b0597acef76826581e41afe1
SHA512a8a0123431ffd01ca5135b2d3ecabba893f9ac0ccdbb6c4c456a3175668b954444575d5d1e36540246b8fe1ad0df7fae47fb44131370fce6f10a5bd5951da4c2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D0I6KXNQ\478691279-postmessagerelay[1].js
Filesize12KB
MD592169c8a0fbf6e404267d0705cdbdf42
SHA1a5cd88b74ca5ced239cdbfb458fe25540d671f46
SHA256dba668b49a111527aac8f616b9053ea57c944e01a84ebdcd02a13da921223384
SHA5128c5d35ea512fa7be367cd9a9ded2f23822dcce730e5502a355ed0d48949ef763eab13be0d50a66de6b0f8419d6a002c12c4ddbf20d97f5393ba922e48a4f02e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RU3RPYUN\blank[1].htm
Filesize167B
MD5f5d40b7259645010f9a248858ad14178
SHA1b3051d17a6ec8c9e166bf09a62b48261ab86957b
SHA2567f5007068d2b56ea9735e2490d60cff2e72cae312024ac1f6c91158eba47d05d
SHA5121e82bc2d067f726670b3e6054d73e57868f6e7c50eb979696bf927daeef699f2d8f8de201e8252b86b0e9f86dc69e5037fc9fa08ef6c271b033f29d4f0f4c1aa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RU3RPYUN\rpc_shindig_random[1].js
Filesize17KB
MD5f019fdda31635d2a31b151ad8ad56c7a
SHA16adcbec55f66ffaef83d9a134423aa98eb2a2189
SHA256c7fc0b1526533002c956ebf8e8c42c3ad3f96c41ace73fb4063cc89051944831
SHA512fc278c12316e098976833882a38c788d812f9d36bd1b9b2b8c87dab4dc906af26a860df95436ea1b7d509236d44d0533d475a153437f8f5d42653fc28a77ad64
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\cb=gapi[1].js
Filesize64KB
MD5ee01651d160cfc55249d6011a3c45916
SHA179d6121df6575974ad21dafce33ec98e3f2f0a7f
SHA256639d75299973c7d3794eb7eb129e3b5a6139f9f521e1f14383abd0fd501219c9
SHA5128a39dfc1ff2c58ac106225976aafdaf7befc0a28903a0c65e2c272e1967c3336af2b477ec12604400bb8e16aecee6567c9cb9d157e3d54649e28b9b2f920432f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06