Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
0b5a3027bbf79b82976209d6d5f9734a.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0b5a3027bbf79b82976209d6d5f9734a.html
Resource
win10v2004-20231215-en
General
-
Target
0b5a3027bbf79b82976209d6d5f9734a.html
-
Size
53KB
-
MD5
0b5a3027bbf79b82976209d6d5f9734a
-
SHA1
052bffcb83eb6d71d7c72e47d6a678a2860d0589
-
SHA256
dbb6522de2fcb43ae81ac55e34934f258ce3d9b945fe69c7670ae884328d95e7
-
SHA512
82814479dfc53943b351e176c38ec713b91101a26d7311f491d2c16c1386af3e71f08fec26748046de1e1192458b91dcd8d39fc1d51453d2d00d7c97b9670a10
-
SSDEEP
1536:CkgUiIakTqGivi+PyUArunlYQ63Nj+q5VyvR0w2AzTICbbnoh/t9M/dNwIUTDmDv:CkgUiIakTqGivi+PyUArunlYQ63Nj+qm
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000523de6c15f90af59ffdd73a5aa2e3e44eb0a158afe2d669c10b66b6fc4f85b59000000000e800000000200002000000016aa91263ea2a676b9518acf3547807871296aa97b264f98481c8ce0570bcc64200000006f7fc78c06ed9477dc27db9ccfeafce4d1efe6cf3c0c6ee957530e2d37dbbc3440000000cc91d7c3bd73d2c4debfe7be5158b8527f58039e6f70701ce1db1eca6816a99186ab842898019bbbd27490e2cd18a549c011d1c0378265371cf5ad718aaa5019 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410113640" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300a77db383bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3536811-A72B-11EE-BE92-46FC6C3D459E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1476 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1476 iexplore.exe 1476 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2352 1476 iexplore.exe 16 PID 1476 wrote to memory of 2352 1476 iexplore.exe 16 PID 1476 wrote to memory of 2352 1476 iexplore.exe 16 PID 1476 wrote to memory of 2352 1476 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b5a3027bbf79b82976209d6d5f9734a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1476 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51cc9891cffaa43230d675e395dba1deb
SHA12d8d8a103aca5e7b7a739191a70847ae9e1c3015
SHA2564e239cfe2b79baec2057d84afb37bc3cf599e4ad2df70d7a2b785ddca97b6176
SHA5120b04b6849e3d3acfd911435d32cf63bae6d7b7a0a7702c7c409a686b6d139fa66841bb2d158c412dcba5408e6c64a9788ac5242f99da3d2ec4e82b03c6def12b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582d1ebb256770f81147c8734ba52a0db
SHA102ab3fae6416f5a9598e295a58f63f7f2cad1b7c
SHA256d5d1fef3f18279ecc726fcd8c4cdc8333491834360836d0466c85916990bd35e
SHA51214af8be561d5804c7132273e1fae64a423f56cb4dbc3e68d8532cba5c9db9b5bf95cb09889012c0643ec8bd314b301a0e9f67ccdc9a331abfecc47a44b45e656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e3a46043928da165b614f5bbd00048c
SHA1918f2d0b3936eeb41c3888ca765d64f4c02fb060
SHA2564b1f99b2e6654070a1a76730e982918b367441cb86d81dff742d10d85e2ce04a
SHA512694b094503dd8011047699421a3b6c98de9c99589343b7afc1fdd5aa39d5a705ee21276802cc11028faa3cad404f0be4b98606037eaf5221c6f5378656aeeae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8115c8070e997254d30593737fe8bb2
SHA1fa1516c29a3c5965b7bedf79259e956cb96e4c44
SHA256b09162c568d801a7f4c06c7974f54d5267c8b200a11072dc7605ca8066790231
SHA5123147d353856099a3b72c8fd79dff4c9174daa8187b8ebdc9bfc83126d046510f36e92f86b4ab3f52888b7b069d3607d00de8b3a9568b86fddab919bb0205954e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52629cd3c590bec738ccf0feefc6dad93
SHA157cf7b8d78a150c985e1dc43b48749cb0da02f90
SHA2561fbc2f5b59adff21f1eab33c466cc3c068bcacc5681af4aab58d56e10bdeee5f
SHA512bec4829659785d6a511ca155cac750d50c0075141efb13638cf5ec66f5c50499000a2a877de8788f4bd89ce0d68083501742fdbd501c1ea77756e934ce09f0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e9a872325c13c32a32c4158c7e2b0fb
SHA1aad41e10d917c90e2606565d3e0762d3ea009f54
SHA2562ae380555782973ac1659c2dd36d59fb97ae37dccbca7ca0b1a51ab83bd55f14
SHA5122f472f5d393f599f69877ee5285478338da399a5be0ee7e6ab612ec621cf1452463a49dbe1315b91f537edef3f564928fc71eb9eb303d20a6d00d0dcc01839ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8e9b235906d847afd8052476f1443b0
SHA141cc6e3d93cdd8ada98cbafc9fc8ac624c931684
SHA256503accbb2ec496e2cd34c40a47ded193223baab9af31addc5664bb4776588a95
SHA51236f9e2d71edff297f55dc2e03bf2a84b0b3bd7ea5afdb32cd6084fa7f08193f26d444665aa935b989cee5bf90d8c6d5b3aa677107c561029f48d0bc2707f2b1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d77a97ebe0c29800cb3598a858397a1
SHA1b3eaaefba40cb4499f8196a75bf86a60ab5f3734
SHA2564cc3e6198a122e2ea752b9c1a6f5c91e3bac38ab32867888cfb08c9062999601
SHA51247bf9c066f93eb0136b057787c5c9ea9fbe40fdc4b471fb03d3608081db5675716d9a445117a74e1530760dba9968721f860616bddfd0b67020a62075be37e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eec8b06ebd21c436bcfc81e2c115a866
SHA156dc37ebcf7deaf4fedd5fa74a39705b8ed0b629
SHA256a46a38f5968333c556b92d320f364915a51b76dbf845fad60421a7ecf8789a73
SHA51248ae107a03958712b0e66e4631f3429e92072ec43f248857804a1776f0d0d018baf9d96c500aaaffc1e673ccb09c2978a0ba85676a83356afcea09fbbc2ed96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581b94c05ea8440a66a84a1714dfaaf6c
SHA1145e5aa63ce75cfcb6925d7373807c4d3972fdf0
SHA256894f23aa0d0870a81d9a63fb3e40ffa625c6a8df643871e3fdbd61da3fcaa368
SHA5126b18f25de00fa54821a2271973b36e7b9adbcaecea8f2a58b6376f4ac6ffe981fb4dc4c9134466034c0e173d8b434145d1fcfa72d42e8687f11d49883aef7bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f774ff2e7428613adab42309c424bab
SHA1f38726286bc85dafc45e1f37738c4b3a5feae21b
SHA256a7f1351201363dd5c8f9d5f9855210517160e635941f7eac5104aad71a1d0c1c
SHA512742975937ee41cb997e1fb77ffb34cd531b010d2c8981ed9b4bc783b7059059f08b88c006308cbbef5ebb4943e5cfb2c56cb18c7b1329c51488ae6c83ed9b5c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a3b928de70e2ca384a5de18ada22036
SHA145cda943c0d8de7a57d4179aa6f8b213fd0e205a
SHA256540aa71f193e09650c6e3e344c7a1d469b5d239535cedfaede7fb13d5d845be3
SHA51283a880a776ee1446514509ba3c7a9dcb3cdd86cad7aa1b7e268762882dc6ca24414d1bd0220197763e51fe382d423115a9705e3ec1b3221937b44a2d40ad1d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb0f34c96675d41d5c40c79cf66faddb
SHA16d6931df752c1015b38afc831b7e3860cd36bf5c
SHA2564d9d9821a4ac42a67f3862d41423583818bcf7b70afecfe10fa4870995ac9486
SHA5129da08240df70447761f60f7c2a93c9cdffe41a69d570c7eb755a8472e18647eceabcab8d75bac3346c65189fc248e93dede40b61e668afa999467eb8be3b0d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531b322f02b9cc1574a0e05b6b3bcdf69
SHA1c1c543626f86b00df98767e40ade3bf0502de71f
SHA2566810cefd4472c0ba82fe6c86c9f8158205f1841565819e6f3b8ae79ea995d105
SHA512847ce05ebd0678b7096b6c66e6d475ff64df9020e2e3e85c6cff7c9b64ff972cdd9b2874bc2811ced42299ee2e66150f990ba346d4cb8998c3ee6289ac59e912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f9fce0cdd604e72bf88f08b9598b08d4
SHA196e538e3cdaa9f58d1cde727391f57116190d7bd
SHA256f47a6e2697ca6e2dd75d7709ff43999580fd17efb42336281bd15028e1ca4e01
SHA512a4603758d2e697e56f4fad9937798c3402d4cb9b4d45cb4153390b19b07377a89e14a2ac0c3a0d1e206f50723602b3f863a00e47ef6f1747a1494a0e9dbf422f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NO6NH87R\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06