Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 03:36
Static task
static1
Behavioral task
behavioral1
Sample
0d27b1ad848dc46b833eb7bf62a5b77b.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d27b1ad848dc46b833eb7bf62a5b77b.html
Resource
win10v2004-20231215-en
General
-
Target
0d27b1ad848dc46b833eb7bf62a5b77b.html
-
Size
11KB
-
MD5
0d27b1ad848dc46b833eb7bf62a5b77b
-
SHA1
9fd0e0b1c30e4fea06b56310851e3ac902fc41f4
-
SHA256
e45b3b687e63d7a8d371a35177cc4660f8b09e7ae3de549a8e27a29b904af549
-
SHA512
64f2160b18633f9750f61bd27af1825330604755125148651c02ab83f1db65f2fdbe3d4db1c6be99fb5b339a3d13f2b1f1ce7035de1cc60463704aaa40449a27
-
SSDEEP
192:2VblIsr03Oz8k/w1wvqLkZJBv6nXvzR6R01ImvLuBuLbdU8d:sblIcuOl/guJBv6nXvzR6R0ImzguLZ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{494BC2C0-A7F5-11EE-AD84-DED0D00124D2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410200116" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2940 2672 iexplore.exe 28 PID 2672 wrote to memory of 2940 2672 iexplore.exe 28 PID 2672 wrote to memory of 2940 2672 iexplore.exe 28 PID 2672 wrote to memory of 2940 2672 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d27b1ad848dc46b833eb7bf62a5b77b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593a95369fa46dd8edaf30738302a2d33
SHA1f1f6888ffb0b168a97c4ac145411494f0634af50
SHA256e84226a5639f059d9a809b96ae15f1f2b1ad214af107b086dbe6ec0bd2e1c4ba
SHA51266589997fe0256f1fd9fe21ef85c679497a70c97d61e785a8794b55e9748329147fa19e0a81f46c4a7db1532aabb18b8ba110ff3dcdb37300c8dcb8fa7a93882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab6655404f683f5eac42e3620637f356
SHA18c77e59893c74f1e61922d1f2660a83649d8274d
SHA256e4adb0ed517e0ceb571ff12027f3f430003ea4249a45c0ccdda881913d7e706a
SHA5121397d2cadfd2280859d11c61a4f2a97a0f19ee2a5feb40f888dc46e8aee39ac48776d571cd4177196adabaff02660ef730c9e75c53a3fa787c3e4a5383b53f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d204c19b4ac7dbdb45f385224da1f8a0
SHA18063f78e163b128b95337f7627707a7928bb1265
SHA256c7c97045de864bb846025cceffa80e5f48cbf513bbe822b39ca0638c1b09147e
SHA512f732dfd37bdc8166d39e8d4ebc4909e614eaceae92024d0ad1f1fea18630b424ff7e4ff19d225c17e147265b23f0fd2790153051c957243b7351b8ef7f41d90b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ebb3eeb64dbf892e5fccdca7ad0e329
SHA1d94413bb6dbd408eaf6c192074057136c67c741d
SHA256b54ca976d98c4840b6856a4e852979ef27207777fb802983d8ffd921006ddd6b
SHA512c527ff1118203d9a4574b45dbce81a6fa9d66895c12045a082c3499187332f8a1fe71505384e12c49056c99aa24c8b5a90c6e6cb33cf6dd15070046e6819f504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592669dadaeef787ac5c813651de7db69
SHA12d2a26be60d22ab6cfa2c3498e77ce7812587431
SHA2563047a06bea43d0979ac9b3545d5f76d0f6ecf78c0980107c9c934f95a11bdb2e
SHA512e9c3f441a24f4b4be06b74ef09af5f2b4009ae2152cbe159599a9af85ee374e953f7e953fa5a1dc252ea2b5d8306174575f95ddec92ae150c9a0b96b1baa7943
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
99KB
MD5fa178920e56586a7d673ef62ab4575c0
SHA1cfd02c6a6b26f3407a1f9a91411f6f4467b1ee54
SHA256777c3d087168f5f42bbd550047ecf607a3a375eb621d7e30a38e9c8803a861b9
SHA51212b20ccc55780883d3b4c36366e335a8d07d9581a2684de3e1c05055b6fff4dd3e0124cc210e93f5f4306c37a163a92584047d5eb0ff5d71f04ee30c593a836f