Analysis
-
max time kernel
120s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
0ede72670821e87812bc1fc132f47cc8.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ede72670821e87812bc1fc132f47cc8.html
Resource
win10v2004-20231215-en
General
-
Target
0ede72670821e87812bc1fc132f47cc8.html
-
Size
2KB
-
MD5
0ede72670821e87812bc1fc132f47cc8
-
SHA1
a042e7dbca3d712453e0cc298e0801152921cf1e
-
SHA256
c83a66d0b4a420d3945755df7b7c64087be5c6dc1d9af7cd68106e907f70e5b0
-
SHA512
5743dbda34629df23ec218074c9e1bbbefdbc020d81d9cf3abfe45d1cf7b2d1f1f1552e2d303537751e555f9bc22ac54ed1ca9c2cd1b214e3b09b3657127aa64
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410220344" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 205a8c37313cda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000c42ca27cfcc11fa1e3551d50aa28e00d28029bc0b54318fa8fb85f5e4af31f6a000000000e800000000200002000000013a53f2d6a631d85241312f9764346c8af367816f60b14771e2c74f7d9309bb02000000035e5631f5d2f2ceb7825d12eb78c5c7fac17519b884c76714db91f7ae97880d440000000050a81b2fa5a8c3b99c1584f5263579fb2bfd8a9120573e07baa150f5ec1fcd50e8a21a4b3d178b949fb4e98ee2339322d66e9289afd11a30cb7fce15e39e4e0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6213D521-A824-11EE-B754-4A7F2EE8F0A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2840 2236 iexplore.exe 28 PID 2236 wrote to memory of 2840 2236 iexplore.exe 28 PID 2236 wrote to memory of 2840 2236 iexplore.exe 28 PID 2236 wrote to memory of 2840 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ede72670821e87812bc1fc132f47cc8.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8132791991f2a58be4840341a5f7f5a
SHA1d3b2e6fda94c025b68af1cce132dccd302016867
SHA25678a58479fcab8d75a15f5e56908d9f9fd971ed7314bccc4458eb41166dc47e45
SHA512a3fab145e471a3b8fd34f375d3d0bef49742b35dd8ef568f088a909e49fe16eac5977fa8b707200447c7805ede8c1bed695b21215eeef3f30cacfd5d30fd93bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5260523d0fb759dcdb6da0845feb779a9
SHA1ae9c36e78f188fb7635526438ec6bb02cf04e965
SHA2567409ca2ca2d835e1406bdb46e6f3500195b6b824217a9b8b7b986380c0ea6549
SHA5120fe825392904b40777c0d64448ee9eebd1add5a958f134e479ce58fe149e1d88dd7d36b67e226a4bc15fad0dd82b6fa32a1d4a9bed033a5f92e5215a1b474744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dc540f65c3d77ae9c8a2ac372a8b78f
SHA109958aa42db96f616d83bf3880d1e9e3bdd75d4e
SHA2569e10b081b3af0376e1f65d8fa3a5326393dc06359350dd258eec827b1e776046
SHA51279d899fd8a262315d45ebb6114923f399b46fd7edcffdc390774ae2e94570a792a2e646604a5eda33685a24174525b7c13605cabf462388e4be0f86f788fc287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a41f916e9f017d93451de5218dee903
SHA1abee8b6af03d3f578d3dc5010c6efd1aa1d1826b
SHA25686dcbeedbdb3b0efc6e73896b7221900a9ca964ce64ead530144639c8ed139bf
SHA512135c6380f24dea7427db1ceab75aaac71abbe2514e4782d2bf299194d07f237a5c859c1be91838f14564e66da316cae3d91da9d37199d700dc925bc58cf5dd5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518f9d64b40da81ad86b4c46411e19b56
SHA1bcfa350718894e73ffef0e25b9c286ffc5089fe0
SHA256cfc1eace715263110b0a94bcad48390e17568c5670f4e9fc9ac6ee025e8a2cb5
SHA512000877ad69a3670d7d9655071d1bfa8f7dda37cdb75ea6c09b3d7e21c1860faa54e14bdbfa7ce7a6fe663a08d8c56e3df56a2b1b57dd8979ac3bc3abf37c847b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551fa6d8315e05f183524f89b15d7ef7d
SHA141bbceb1cc6a99dd51271077dabe38382874634f
SHA2561af7b091369d7d11a8eb35aa3fe3e7877182b84b204b3786ad8a2e72d7173a82
SHA5125fd53519e38f09b0e20c30fcd5ddb38840e98fbce8cbf49c28da6ebb638d5c5b0e2f87d87d33c466a9fbbd1316bfd00c844fea18b2860d312934cd457d2a46f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c14d19efd3e7d6d862dad160186e475
SHA1cff5ec134b8aafba3232d2d8fcbf22cdc5dcdab7
SHA256c7b2e93d9f7e398b0b5c72b10240cf07bef653e4a7e81fd4d3cf1a8a08a969fc
SHA5120f89c67f4af942dbea9a868586120979f6ebcc7b8c96997bf8c15e94d83794dc2b24ba6a2813572b8864a8d6f718cb18dbf3294ea6d87dd7a26d0710c9e22f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db09310f693bc5bbfe2d9efdd6e21ac7
SHA1b4c432328422e05e883e66c95d5aba7db56f6b43
SHA256d553de892eef350b3746048d196ca4e5289342f651243f0a41574f22807da4c4
SHA512016e58d104df06e73eb5805a4fb0fc45753a5e2fd2c566afd0e07bf9a978196c0694e6672a0846c44701044373e64b16e15525320f3835d6f1b1e4d2632dbbe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0d7bcf9c87a953a8ab749f2ddeb3cdf
SHA1c5d5268c6f8b8a74e9bd2281ec2f35d5beff4764
SHA256c38387010a4ac6b5a3131eb20a25cc64bbca4c1ea7c73d1b77b8f5adcca6c674
SHA51276d87d1b6ab12f3b9e5ddcd894665e860421f7ea2e191d76e24e0206a76461179f236cdafcf70917b0883e80785e29c68fcb2a35f8105e530b5030b62b3c7fda
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06