Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
0c9e6384aaadd6418b05ba065d06dd41.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c9e6384aaadd6418b05ba065d06dd41.html
Resource
win10v2004-20231215-en
General
-
Target
0c9e6384aaadd6418b05ba065d06dd41.html
-
Size
432B
-
MD5
0c9e6384aaadd6418b05ba065d06dd41
-
SHA1
a4fd26510b085cdb4f9bcdf5db8c0dff453a1f0c
-
SHA256
add02241e7d92620904bbeb7052258e58c5ed8c0208d026e267c758db76392c3
-
SHA512
3731c255b9f715d4922e7c5f1c15eeca90535259a1ff3dd764c779e5d6111e022d5dcd18ea83a457cd036424b23c453b37eb391e67d9e19e8af735c1aa22119b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410122593" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000001516190faa3a35cab9522857f81d25f3eff4bee53a78313ae5949e22696f4c8c000000000e800000000200002000000007877a993cfc7f58b1a7de52e8388c7becb0e7cca13b3c7036bc32ca46f6583490000000e09cce708b6680e139265ba186807bd0ebc1b19dcd77e37f2f122788321fe98803904bf0ae3313d28d5bb129157bd0589bab9130ca2c82d5c507cda5beb62547308f262dc97267b2bb759b78c149726c9a339dc0859066a970131cfaec57652c3cc666556c64f2e5cedb0af6957dbfea3592861d055578e166adc88986978a3f469feaecbd44216118ec380f4ff547b6400000008129e49bdcfe8bed99eba495b1d87b23849d4b2f2ed85be5af36368bd527f1c75ef58a062c2965b8db5c3a4756f5900304c85d1d3694ced364641d4ba8834ef3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000004c8e468bd74582b491bcb63f8f1fcef70480927996d00bf58bffde41caa386fd000000000e800000000200002000000074d926d7fc8d15bf0cfe2a14ef556a3ef36e2fe542e037d8a1f4a1905922b50820000000ec9e5f1981269501d7147841bc9d57d90ddb5338da793fd847b2f3ed4c7184c740000000e29628f9e2916cc43b327fce02bf5365f8a480378529c0dc173426ddaa0f4cc494d568a0ed543bb9e6510b431681073622133b893df2e3ba8ea1cc1261ab91c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004424a14d3bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8144831-A740-11EE-B279-56B3956C75C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2448 2212 iexplore.exe 28 PID 2212 wrote to memory of 2448 2212 iexplore.exe 28 PID 2212 wrote to memory of 2448 2212 iexplore.exe 28 PID 2212 wrote to memory of 2448 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c9e6384aaadd6418b05ba065d06dd41.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52571797181062412f7d091642667461b
SHA15f88c85eadf7dfaf2eac8a2c84faa7d4938b2f21
SHA256fa246a21e45f940e99e0edee1a6e54634eb126d62d9826283cdfa1ad346be14f
SHA51294f7648f43b0bca0e979ef4c9a8832f3ce659d847ccf38236a35d10c22e9800c4d2b8bd742ddd1e34db3265bd485376a8c6302a0bce54b9b084ae566c440bc72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db17fbad5d4f8b032a5e8e0044914b0e
SHA152f57643b26db3003de54f01de37a4548269b3dd
SHA2567dd574615801b0ab764def066ed9424157faabd0fbcd7656a3b35f6735c55f39
SHA5129ee4bdbbcd25fce87fdfc253530e7bcd2d6a323b29d4e7336a8a9008ea8656bbae44249f08fc73c726235e790e1c97b8d5fb8fdb04b5f4323a68fcafab6e3c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca708eaaffbd73007b3c961504aa3ca0
SHA1e3b4463db09674698d903c752496950e0a0ea9ed
SHA2561cda0a5d89bef4c62ae5de632a80c502d05bd2dd20a14e555b4a3435645c8e35
SHA512a7ba4e92004a84d93e6f8d029213cc8f44925a88558c910e49cc6f689f3be542dec7dad81afe8ebc92278d39764ef009758d63fb2060f80e01f0be67ee22e020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5274580e9a94df6e557cc7a6971b3cad1
SHA15416c6f97fadf06873e7af75e5621e2a6226d28a
SHA256096beb48a62ff42d06a7a3ed4016881fe89a5b02f2c9f59ddc26acfb123a46a9
SHA5121241593c5352e93ad097a72f49f7aa853c892edc0246681e28fcb8d42ea68332d3b96fbd4b93f30283089a4fadf8dd51c799d9171e80c615c9ef071c9cf9707e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5956263ef3b5838cd9fb7a26c387f5e53
SHA1a4d4e106645d646eb49efa094eac23bbc31a402c
SHA25616d3f2178bc234d70ede553e5838ea01d8f03536ab1eb634c83c04e3038ed938
SHA512bfc0fdfd5ba5ed719624a6f2313e5183c336478d9cd285106f5148215c6ce9c1e93010e88e0e463737fbfa1d1250d30c13e01410400250af8ca4422ceea99479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b90f2aba657f63110c792f1ba2b4a3f9
SHA15ca24a580f59346546a25df43c794df18de6a00a
SHA25632670b7f068a5e92b18b47079131c912a373c87db6a2c6b9cc0558aed9afb1b1
SHA512fe7341316318d88a77f3edbe9858baa91b0eaec06d8fdb50b07edd8ec4086b4b4b5143b1b9a766ed1dc95374d88e424ec0af6352517d00147b18a4e7b8ce4659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5494938521cd9fd99e486271320da4e5c
SHA1e5e1d28433ddc4ea79eb7a5e76a8d9b970c431c0
SHA2564d77b17fb277629c0572bb67117b819d0665f37d5ebb91fbf0501b35b0c8d05a
SHA51288cd7b981b0daa7a9e1e3232fc876d7d079729e90088c9a70c1779c1ab65e115411481a27ec73ef6d7370bc7503109171c0b587eaa338bb1862cf5cebe10c081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c508124f8dad5051679fe1ece1f9d59
SHA1779228ebb87ead433897678933d2afe82a70c79e
SHA256a7b5391aa21eaba4b3ee36192d6f6e093f5728aaa2c65275f957be2321e166fb
SHA5122958669c229f2f117e08b84aae6dc9069e03b3349cc5857e6e534c543a6dffd15f4cf59915fe8f36d454bb2888b70862bb308c6845a19bf88d6251d692bf5d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ca2954613a9c6cb64abbfb584455b97
SHA16f751f278d767602e6788c580544540d30e8f81e
SHA256cf7100034100ec76087fe4d226c88760d4c3d4352f567af8c50810cbd67f0c80
SHA512dc3f647737227bd5b702cfd2f5b33486f6654a0ab842fdd380ca7f7ac9dbbe11a91aaa4171b2eeb5aa480d469c3a5fe6a7d6ba050c6f545492137a798a413890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b4978214575a729cd5737c6ba5435ca
SHA17b519ae39f5db07b1f3a8404a7df595bda31d093
SHA2563309ba1b7713cf896d12b4494d61c4f1088d01a851411e2e4024d3875497f184
SHA512a361972f984c2464bd01950ef35f7a815f7e84ba9c1ff8ee559b738ea63846f63ce890c76e00f73bb9f51a1180ad3ce17db91e869f7dfdcce450c6d934539d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59912c2736391690bfe6a8fe4b207c6a8
SHA10eb04e5a8c365de5d02972d313c5fa25c83c2cba
SHA256b92b68164f7e69a72e37090609453edf092deb500050b4dc43b61e4ac7005009
SHA512b0e76dd4aa60fb8073d6a855582516421026bab3693ca0d4381fe1439ee22d0e36a00d9520889e497dbf48989a4721d7c5d3e5554439f28ebf9955ec6f5cdf50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550a32e1efc8bd7038d16b231a1e9ee23
SHA135931def9d595e12aeb9bc411ab0790e6b199df4
SHA256c817ca4fe36b85dbf55e136b5c97736e0ba0b6fc2afb59aaaec832276817abd7
SHA51248c1ed36843f956bc97a23e4e9f5912333ac279332103f31d04c0376f636d28a26e54b2d6efefdc8dfbe6d51618dd838b412c35a9826d09afb6dff89a1cc87da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ddbd615b4c73d0483bdd85f93d18e9b
SHA11ec353f7843874134423afe37bc639b75a12068a
SHA2563ebe918b6419237934d1e19774c91e6b39042d0d4de322eb083e009bf43a780d
SHA512c6726b0227da30284bc298f1273e430c9c46fef15d9b94c1a118b45c8d17870fe267955b5534a8c98fe980d7d8b80ca9511732c9ca0d3157eeb7b08ef3f87c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fa466eca259717e665f73b2688064bb
SHA149e6e3c7759112fb864d0a89d878de25e1fa2905
SHA2564b955fbc7a256411f1b09eaf0632484ba3554830c7cbd1d9ea2e3ca15d46707e
SHA5123c22cda3ebce211378a12c32639a5dfa9b9e0c796ab4fe2cae48882764963413f14cdd24933a8f03192e2c72d3a417280ebca373477431ae36c2f960219c2720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b2ac353a15855ded1b9b7fb3dbbcecc
SHA1e05b1abc676d24ac86dcf0d4d0bf35a2c602c939
SHA2562624eb128f3742d4c543c5e69575d6f6918a992f6516314cec0f2146e35a6df9
SHA512963fb8b57f63640f000edb017323e89ef4b406ace95a66785e0df12b5f0bef0d7912b5aba73c0c455d92e20d4aff075372d0840c19480a1e9dd86c4a3edbccf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e763f7194e068376818b5176d71d8f78
SHA187c32847b02df2bd993a547b66047d6e23896d12
SHA2564f15c98ee24ab91296c6746e8eab4588c23735b55037d3f310cdf6c247c276c0
SHA5126a978e9df89ffa5c49e0c5133a7903352502e7a72828483af9c3a0d95cf2c17e5526438ad2cb51120509acec7566758a034066876fd8ffe60658dd33a807fe67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bfee8e87b4d06a348557d12d81b8e17
SHA18e103a989e901fe20a1e1f9a8314d77f7691cf37
SHA256243eae1d452cb86843b484c8f7747ff44c00828440d055cdb2f8e7daa0f64c0a
SHA512dcee29379ce4e5ca0fe60931d1aed121d3c2951dd2a6cc4e9ced807a84a914add0e5550a7a600f49656d8422e1d4a5b22c4a443de3a72b651d4c196ca440e42a
-
Filesize
1KB
MD5adb6db3e9cc7395a381908a7b4b48454
SHA14b87c38afac74e005202cc13dd14091b9cfde655
SHA256cf7d242faca46faf4aec2fd74ee35da341bf34cb157a0d66e4dd4790dd3065fc
SHA512a2617c3591c4f82b4096b698a287542eb6a7821a4efc3a457bc1c81946290e8d04ddc41ad9433823ab4efbfa3c8a432722768c8e16bd7f2d6a393d75f87186f7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4R90HQQX\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06