Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
0eacd7fd97c8439fdb51ac3cba3c42de.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0eacd7fd97c8439fdb51ac3cba3c42de.html
Resource
win10v2004-20231222-en
General
-
Target
0eacd7fd97c8439fdb51ac3cba3c42de.html
-
Size
13KB
-
MD5
0eacd7fd97c8439fdb51ac3cba3c42de
-
SHA1
a56307e7decb190631f968644b096c842843b153
-
SHA256
3a392864bc373ba386f7cfd0ca95a8317f9730ddca91f0c710cf7eff3737e2c6
-
SHA512
f92e8bbc2cad7913f59cf06c5dcf7a991b416ef19af56f97fdfff6bd2a94a199174593ed57fe8e666399b68af3edeee03aefcc2d38d0d48d4140efe0c1c019b4
-
SSDEEP
192:SUiQ0LAc6Xlv15GCxrWP03KpyURciS6rVtBrnhsxvS89N1oevTP:SUy6dPxW03WZR4krhh+K67ocTP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0090bd22b3cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA8AAEB1-A81E-11EE-9D00-76D8C56D161B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000934e09b75d14927a3034d4e1a4950795f50580516e7f98bcc7ae854fcf702c05000000000e8000000002000020000000f23d4630579f6c1a5ee1f388549e416e89891697d7b9adfd1de8c56129eca8fa20000000391a3f3613e3577a84b1f97c20a7b5a10f5ac08fe3535f29fd5f4ff8e0833ef0400000007e82d0ea232ca8ea02b5060c057fc65a3bcd620b68bb8c2666684b023870dfeab4fcb6b44458e7efaea80b8ec004d95a8b0ba33bccce4e478d12ac4086a9e4c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410218054" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2028 2268 iexplore.exe 28 PID 2268 wrote to memory of 2028 2268 iexplore.exe 28 PID 2268 wrote to memory of 2028 2268 iexplore.exe 28 PID 2268 wrote to memory of 2028 2268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0eacd7fd97c8439fdb51ac3cba3c42de.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eab5ac01e767860d50bf102487bd7e5
SHA12516a6c7ef1df0ae58573c70f03b71893a5723b5
SHA2567aefcdfb6670713e98ddf04503105bf2ff24881c76b5f80e5240f74e17fabee0
SHA5120d9ca96b59ed40e74bf68666f423cd3c7fd9dd1a790f8c917aaac31efdce3af489c5614a0be0ad4efbc760a6df5135188889065daf1b964a147f20e2bf69f94f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a1c8a1177fc56bd03e6df011c2e08ab
SHA138069f58f6cf5b1f7e668a0f600105177e95f85e
SHA256c652a5569b78c1a1a3146ad9a5c16a9af68a5a91fa75e132918548d68d6c7db8
SHA512ec4de9826918263f931310fab36c786309f4fb2e15ef80f755422646bc84295413db67ad179840b852bf39f9e505ce7a2167e06be76c2a6c3ae18287667b6b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d9682ed1b9e5e5a9d6f6155d0c2d222
SHA172a56f2eafb1671934d5c8a014c6df951127650c
SHA2566146054aa21b4300e3c9e29bf43fad3e5f1db3aec36c4fdecde00244b2d8dc28
SHA5122c19979e246a7caf351a5ed39d9bfe4bf567920e7dfe02dfaee9e107ea799e56e17f1cab1c066062bd472d215b0618b93abf200d50d43e980cf064061571277f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5978894ed83cad20cb4121463f4e7ddff
SHA11f24c5ba265310503d313c56cc16b04dd91f732e
SHA25600cf4267223a052d591439319be1a9ba2c30352ab7b37a2e538f879da0a4c18d
SHA5127f38a5fd294dba3c9237bb33e0cfbaf1274702403ab1d8f7111fa3ab3e2224981646eff5c9d3ccc6aff55fa58bb91d9de2cf9710e7e03065a21c352dadcca1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5035e97449b7cff9826028bab2f3604d3
SHA11b052b575047484aebc26607cb3273d05a944a98
SHA256f698f590ecb50f16a7241947a0a77f0085ddcef6c3db7c454a60247365307724
SHA512d625e983d831e774c23af496fb521f49192f6e054ed18adcd07462a30df14830e3b51a2dc7eef012f5e0295c4b96c36d614f38a043afbf1cb80084abccad472c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b30112944abd1ef086b34b9121d8db21
SHA16c466893224554901c88f4a6f09bfaac26323bda
SHA256efc7c48f3584193e61b9599e621a808a77628eaaccafdb8c0c19b56b6ca7ae7b
SHA51252640529793ccd9ccf7d254c6bf5154f03f2f3a7bb847ed9fb9e3def3fb54164efec3d268cffc5570465bad2deff07c910f58c1ecc8ec9a2ef5e7db24935fc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519a06ba4f8bbf8874e2df8e6a60b5562
SHA195b89f0e0f83e2c7746481ef6c3368e4786e873d
SHA2560d6efdac7a5a2e3ecfc110f26db4a48f175e339910bb4a68630486fde1b18262
SHA51252a5d73233a15c58bcef8b9b52c821a0b1f7f03061fca54353c5d8634a1410ba3aa4a5d80301c3278955e1539367fc0de6806dae0fd1a65dddc9694149ebe96d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06