Analysis
-
max time kernel
121s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
attachment-2.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
attachment-2.html
Resource
win10v2004-20231215-en
General
-
Target
attachment-2.html
-
Size
382KB
-
MD5
75e0a72645e0a1a8718888c705b9c937
-
SHA1
50f5954ee88211c51c3e5cef6d00e80971cedc46
-
SHA256
fc5f5abaf1c098586d3acbdaa1af0410a8c7c4ff7e3511c953e30bded4774146
-
SHA512
3662d4f4852a2559e0f9f7726dcc1791d57a1cd211a2ee6d5210cbfa32372217cdb4dc3d1ddb61cb72ae04b34c3406924278946174d6e394f2a8dc179ad61376
-
SSDEEP
6144:PFWFS1vGH+Ex7K5VAdSHyBHjvCxIANXOkVsigepLEDajIqoCYZu6Pr8P5rOj:PFsWvGH+Ex7xHhAR1IbR3IQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D88E3751-A760-11EE-B6E6-EE5B2FF970AA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410136369" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05547b06d3bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000ecc99f06b2d9686cb261d2e82adb395362f2a238987fe4e8be895fa8e058b936000000000e8000000002000020000000df6b7ae1e4e6fe832247f6d42882ae3f8dcc433f14343d9f3a0b9641ebe0ae6520000000ad82462e0ad7c61f17414622466503ef141b92aea27ab75bfde882b77eeb67cf40000000b89de1ad183bf8055e0f0bb37d7e8153e9b6a1bd9930b7d848e5bb53ff50e447abb4a9b616917d499eb8f92e3f62fa9672b10d9e45153d5e4549e6ee4916cdb4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2704 3032 iexplore.exe 28 PID 3032 wrote to memory of 2704 3032 iexplore.exe 28 PID 3032 wrote to memory of 2704 3032 iexplore.exe 28 PID 3032 wrote to memory of 2704 3032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\attachment-2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a82ffd821586f35d3ae9e3cbec0dc0a
SHA152e4b490a22b79d01a6bedbd3d5c3fab7c1c3530
SHA25637770147a315df63d0a0aae80ed6dea210fb062a8f7d4ea86e23eb9e67b38293
SHA512f3285facd3b6ce7a9336bd22bf55b1c7430831742a59f07dfaac72561412bf32d6eaddaca769d5e9e6f07e1f0d89c9309664acf0eec597188b932af9a8d64334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cbb7deefffa6b343a97f32ca12326fc
SHA1105e82e5b749a2f9924f19bb3eebf8dae00f6237
SHA256539ebed873959994dfa717408bb461011fc310e28dd3c635eb2dd23def1708ad
SHA51258d1483faf0a7efd65bf2b08e8062eeca80b2744cc75bf205f2b8cba7fb482eb007de9447765f2e2c0c1b5f91e87406bdb6ee2217fab2ef585b98dc69a610186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff153eb8a1decbea24392ac142fea252
SHA155ec177f05ffd331acf4909771d72d76fa19bd63
SHA256dbc510fe68d150ad930a27df3de04221c98be6a9e806c38fc36a4267e828b137
SHA5121fec75cf0eaa53ce8ba22b47d8de1896a0dc88c8ab61c734c300c343cbff06d2b8167bf83c1a503060648cffec2717a2bb4fa870bcfd1cd7b182f5530c19f5d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509dfa339af2456467d226b005a70f4a7
SHA126550f4c713d79ba75fc854b7c8f86fbe6819633
SHA256636aa8b9b8ceee73e5e51f855926a2239f4b03e89d38c954253dc5361585076b
SHA5129afda311186f8fce3da558df2e2ad3013575e094954aa3c333866d167bd19587e5d316d92e1a5f0f17a9a57a54167c094891292ed1b3a8acf8c91b025dc35694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522ec2fa0da0f11837ece2726ed52de12
SHA10f42b97958f6ee67a96998e33622263fe6b83fe1
SHA2569fe6dd3f130192be15e630895d651a7c3a82f2dddc3ec1d398148b1b0347ba59
SHA512f0aad6ca9589dff90af2b581a2f591896b90c05bcbc214c3b6bcf1c5618ac69d0ec52bc319511e3a3d9d51b9e43e06201c2391d387c448e1f1b5d468b7227665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0d6c4aafa8203dae551633ce991fb9f
SHA14f06768268bedfa12b1c0b6f05947e2438500d7e
SHA2561fc76cf7a5eea79b81abbf442ea7476c9b839bdff76c583667f48965711169e7
SHA51206e4f900f23b5cff0f0cf4a9824e9fb1a990200dd948dbcc87873610dade85912b6bba6feb44df9bf71bd99aabe5e0571c211cb488240b03b188d9662a377cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b91fe1ee18c11481c7d7afefe232288
SHA1e2b089d9cbcfe40d5940acc9d2f53afc30836f02
SHA2565b11a9e0f6844fcbbbf89e075eea92a05bd1ad50cc20a14a0a76df7c82ce6d3a
SHA512e6450f3519c04301ea45016acd49c8581f8cdb570773cf8ad9bbef6523a0062b8e8cd0f742c88e4fe802aed5b801df875cf098c4e89b28f989ad80577dec5b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540d4248c0eb0ffb0eb3670acb0ef5a25
SHA135878ae5a4b57c609b241ad0b66bfdca564053ff
SHA2569945f1973275ff4e0aaccb2cffb0cdd0a60a8bd8740b089885f850d82eccdb01
SHA51238309c874f510d9130a5be76432d0c57bf9b96bd2a84cc13334031890ebfa0a2aed04156a47c33dfe5140cffcafcb5b1fa9d4c39707ab7e190b0d70e9978c43e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575908cbf5ed0c1b8e1d54e98d3fc1af5
SHA1da131b82ae18496583522bebe0f8223de34bba64
SHA25612cd07024fe30824c66c7fef1f368b843a0997976652b729ff46b94e97f26ada
SHA512a6a307f30775c8fec78352a113d71318b5fea2b79038f31ae6519550961c4b61f6dcf7b21563b06d7da43b700803c5d0e5948f4394b22055abc1e10e9082c5a1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06