Analysis
-
max time kernel
140s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
0d988b86f7bdbcbc3a70e80f83983002.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0d988b86f7bdbcbc3a70e80f83983002.html
Resource
win10v2004-20231215-en
General
-
Target
0d988b86f7bdbcbc3a70e80f83983002.html
-
Size
491B
-
MD5
0d988b86f7bdbcbc3a70e80f83983002
-
SHA1
4a7336e28568c63e390bc7056a7ca27510395fce
-
SHA256
e4891fcdcc681d680f5d63000288d0aba94351d2f1014305ac31a38b3a1af633
-
SHA512
4cf8e3b4a0c5cca5e9c69c536bf417a1446bbe410ebae9adadabd21b9ae450f20324a5c4548bdc86107ff93f1cc6b81704c59ecec8b10843fec07228ca016542
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d780000000002000000000010660000000100002000000040ad054efc2d43f8d305f91d364aca024033d78b7b6c826f70fdfa832b1ade57000000000e80000000020000200000006de4696fbeb2042435577d2028cf4dd98bc9ecc41a1e19906b3d279c9ec6da7190000000ea5700b738eb55ca650430ccd6c43a82d8aaa3fde4ea7769410555ed1610f1e8f94a4300ed229beea67b48d87df9276f54f692adcaad68548a42a1dcb1994a428d52d2874ebb5230be18a718a317ba1d00814cb87b1f2687967f8df7168a94065662cc38034e152c6abc0e04f8d9e57ad238be4ce42780d5a22383bc56addf6649c2c2191260bbffc91fb3211593fabe40000000ac1fa264409934848815ad8dbfef1381ecbd843fb9b07495aff9401b2691123d47220c8a2eda8032861f2ca9e267cff455cace47a49404fb7be84125aa38ac41 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410205334" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000d2ae9c96a269f71faa8c860915760794fa14afa0b3557be9f3b4064e88b5a4da000000000e80000000020000200000002106e40546fc85c9551023642c024363c8f2b072e6ad01aebeb2d7d358e6b4d22000000037be8ab4ee23e16ba8886f8dc3c6ee54d60bc4344cca9660549cdcc54256b34e40000000624d0784f0ed80752b05de05bbccee703d96183a2ca17384c9876a74a5b4de0ea83b9c66ade545d5478356633a463c0593e4d4c3d5d939e009882fbe24630553 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6EE9C5C1-A801-11EE-888E-CA4C2FB69A12} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f766470e3cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1072 iexplore.exe 1072 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1988 1072 iexplore.exe 28 PID 1072 wrote to memory of 1988 1072 iexplore.exe 28 PID 1072 wrote to memory of 1988 1072 iexplore.exe 28 PID 1072 wrote to memory of 1988 1072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d988b86f7bdbcbc3a70e80f83983002.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52a24cdf188955225a596e1013764893a
SHA1eca825ccf8f37f23133a3d1749214b8b7022d75c
SHA2560c72aaac799243068d078e5c185deeda4bdc51b6164c58e76d145833730de833
SHA512fb7f6426e0c1431aa7211dc6639a0bcb39ead30d254a0d1cf339871c5a2f5f344909086b39e0967b8b101ce22552eaabeac4721e68891f9feff2c4fb64a717c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d209aa403e0b0ccd40c7f76068e16f9d
SHA1a49365de059a4154cc1d9ac976a025028bca8463
SHA256311e3617e15c3eab92e76542b3eaacc72642b855a79e849d20a333bde1b4f285
SHA512019b1e05ec6f792ad70ec3cdbd0d3fa292f7ba6203416bcb2ce1720f65a7e7df0ebf0412e5db01f021e4688a7ae271b6f1521f97be7b471fb60fc96443fc3a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5478892c7baed3134f92170cda53f0b4b
SHA1e68a76bffd5b035dc49bd5bd4d22aee55fd186f0
SHA25687617ed609f37bd750747754a974ff6bb0a6b9c1b7fc41b429f9ad79e22d44c3
SHA512e30af0a5c332e3f6fc29df824d594040298b4ef81b018bea7bc40b5ae3d9bb018fd90b1db546ea32af64e2eba1618189b566aa8142b6b8b1da6afda505146ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd76a763012607bbd43f2a584d4d9554
SHA159bdf2c42732c77347b0321f89c00958b42c6375
SHA2568c8351171e28150676dac5d81589d9d4016bcd0fdfdea4c766aa6444c96acae2
SHA512068f96fc24fef49558a38987d17a1fbea0603debc35b09421d9fabc89ecf4de458eeba0a2565aa87e02c0dbe2d9fc74864fca588d26c16c5cd60ee47c9f529e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51148d0d2ad14f6e3a28ed5cd18b98fbb
SHA14040e9f23c4f42a9f92ef73b8dd1aebda778a1f5
SHA256545b77256a7001538f16042961ed8b8baf0c5b070ab9857b38ba5ad806be06ff
SHA512c3d2157d14a7b5e99ac9f09d8e97e159e09393627e4494b77902b051e403ea1b45af388a8e2365deeb31f62578c81b82d193ab230aab3b6eca4397885379ea86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54569b25f03b6019636c8e6706866ae65
SHA143b3f5e0422ee76c42f27034a4861df394133c92
SHA2567af59c15aeda116115f2be2429c38cebf470d59a256228062b2734189404a885
SHA512927ffd276493a0528276a6112cd29ff78db874c35a0feb8323b772b6ee0baa1a0fe73ef487152204ade426190f3401e87332dccb0635a54c54c3697f311da6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa9d81543978b956efab9be988449143
SHA11d7dc744923b4a9983bf75e95d7149fcc31a9dff
SHA256acc96924047e17d5f10d8690eb6a60df21c655fdb28c637dd45948cfba68c580
SHA512a4de674564e41e666c8eb972fa4717b8857da0b8c32346628d4a246b376fe3ad93eae304c4dc851be34eaf3f302d6c1b178c73dd0aa30984997a0b3c266723fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cc52a2288a9b76f935cf38a54482b7a
SHA1242e51276a2d644f9520a631003ed90288214507
SHA2569d7a6f5d311559b7635345e950bc994f072dff2b005426d2179b9ea2f64268e0
SHA512fd2434b795bbc020c533148d020b79241c5570faa81ea374bcbb9302c5679c44cd93e89de34c6c794e7dafdf4cce1d78135e083dc681756f3c801b277e991784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5722cb1bc07c625781a0d7ea40464dda3
SHA10e775a46ff564bdca1fc5685c70ed203c297e49c
SHA2569476470eeeb87ac699485755216928d52c7349220f1e47214149dc3d4a3cac09
SHA5126eaed8470986674f48360ddab77bdde5a7203b7a4e5e5714de8d348ebbd4b8e7aa1fb48e5d9638b23509fb01a4c01b328da768a85b757b6bfcdab2c1a780f542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5921cfade24bc9c74c17aa24b85f23a7a
SHA1e39e08d5aba13ebd9aad58db38299eb1390b5806
SHA256ff3c4d0f8d87472638a521949ded411b57e72359ae4c38a2ed6d968aa49c4e45
SHA51257d1a18bd446bb1fc3b0a1c1ef36cb1263f0c4ebc572d161ceb005c521849f07218be1407fefeaf85516a837df51bafdec25ac91316ca1cb0567ba79c675a077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53f59c6b39716d708a3e0dfc3079532c9
SHA1356b14e35a2e9572fd33a725b24bbd757cea6ece
SHA2566b5c295307c64d13a4231555e3d9d8c6aa26ce19db6e1357e39de12f29dd1ec2
SHA51256eebb538d7b4d7616834fb4d0f536fe5359b47cd4c87588ddf041954b3564ea6de3d74ca874edee64175c365478f05fb76ce8adb4e33cb7e09379a6dc62ad52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f0886a9efefe34000dab6cf27865702a
SHA14a78dd5c18ae8b031809492e103892aa05f7e245
SHA256035d60e360a52748b226c3f2db2482e364a262bdbd0b4c47b160ee2b0ee55f04
SHA512d65235b306922ecf74cd6f0d7f1ddbe500b3acf4d10b52abb174896df7266e85dea153553cb6f92c0f810e3f502f895aae51062c3488b27cc3e7c197f91eaede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06