Analysis
-
max time kernel
176s -
max time network
207s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 04:57
Static task
static1
Behavioral task
behavioral1
Sample
0f48bf7e9fc0e1cadcd3c06e5981a054.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f48bf7e9fc0e1cadcd3c06e5981a054.html
Resource
win10v2004-20231215-en
General
-
Target
0f48bf7e9fc0e1cadcd3c06e5981a054.html
-
Size
113KB
-
MD5
0f48bf7e9fc0e1cadcd3c06e5981a054
-
SHA1
e3e4d46b88981076f061079698a1f8e8b2ad3d02
-
SHA256
16639db71698866e6ca242c4f447d8b196f276e9db847e6785f9ee2d266a6617
-
SHA512
a9cb1397d475531ad4f95589c88e5e78015e20671d3a7a69849f196f867a0d2e414d2fd9a4a781c5e271f34f20f3c40a73cdfdade6fb3e3da636f2e25a880c76
-
SSDEEP
3072:0ZE/Sdu93MzhZOB41liGijZGeilDCv5C+ZMft+2szPp:0Z1hZOIliBY6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00214d73f3cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000350a50b370bce2e56add8c4d0bad73a0d53eeacf9a9cffeabd5a3c74e36f6a87000000000e8000000002000020000000bfa78896914e5ba13d0cea92b255eb931431c4eebbb5fd3964c6acc0b062f4522000000026aa88566ff185f58859b649e702cd7a8da6dc0058be055f24bf289f2e6c0bde40000000c79f3283ddae51d8626e5aaaf3d81b465e4292292868a9b46a15cfd60ed8bd9ab6405bd8d7e3e03b0294e55d9d821ac884fa70df2fd0378bd708bf6d3a569195 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410226609" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F97D6D51-A832-11EE-9BDC-FA7D6BB1EAA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2788 iexplore.exe 2788 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2556 2788 iexplore.exe 22 PID 2788 wrote to memory of 2556 2788 iexplore.exe 22 PID 2788 wrote to memory of 2556 2788 iexplore.exe 22 PID 2788 wrote to memory of 2556 2788 iexplore.exe 22
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f48bf7e9fc0e1cadcd3c06e5981a054.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5194a99f130bd62cee985e0e2ddfc5ebc
SHA1a12c9411ceae94de1b982719bae238c9dd72a600
SHA25652da701bd075bb9f5d18d1e487864f03540acaaf57bac3dfa76af7db1a638ea0
SHA512df934e551b824a6b2636b37614bce3ddc09ab1e239838e5f0f4b74a39f2ee6044943f02a2de7bcebb1d787916b340f948a4a8946ea3b6871f98fb959117667e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1eaf980626ad9584866eb51bf979532
SHA10ec21055b8e947d55de6390977e47953d620eda5
SHA25609d04fc7fde556de7b080715cc769be3c48e666f421a96780f9d134b3ca7a43c
SHA51201cad769ae69ef69526ba64c7722c3662f794e7465a1915cb320ecae5f6c394ab64fd915bdf1b09849e31e87d0ef7b8de6d638498f4266e5568d0afd386477a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6d2782186b56f4a7fda1607d8ed2832
SHA1c0c8d36e7710e39f26ec2f7406d52552807195f4
SHA25666032eaf5b4bb2e1a79645174cbbc6570ac8c3713cf4352780c4aa549b33f0a2
SHA512a7512a1637628c1dcb960ffb3ac812255808a6a7f6de8b715666cec40fc23942a5c53d93917ba55d224cfc246bf093296645dc770ac39778f0df2baa534a0041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f8a5907b4f1d7a6b6de89b89ca6c771
SHA1da01ddf0e30fc44754de41a14853062d7280b52c
SHA25674ab44112f2a11f5fa6968ba4659c0fdf85e0453927518d282c527baf4729971
SHA51261bef8039f119b0a9952b917ec4e483e4b1b0015d1d5dd82d10160d281515b82d05f4f718f86b040c6a734dc0ee4bd00e768ff85ac56a526345c39d8080ce96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6abf297394087db96516b01755bd0e0
SHA1f5c7aeb4bf121238475280d9199456fa4339dfc1
SHA2566fff7325c97af0c643fa011e60e00188c3f22159e4813c3531027b0154baf36f
SHA5122d8ef2b274d7ba27789ab5dcadd8a0990e5dbf8781c61d63df814c5c3b7411fcb98bda2cb11b448819485a0823f2f8d31a7c4ee57367ab5b416f03ec68722761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50490cedfb1d32f0ae5c39e374b211665
SHA1d3e90271f5df97d5dc04e14eb8a4dacbca6b8df9
SHA256f17fedc67de5a8461374c5a7d44d826ea2acf6d565e6388b3a1e910768487461
SHA512b42ab0941e1a307dc6d388d65dbef6c43e856f760eab9c7accaa735254a9989b833f72984882d03d6ed5dbc4933cb310648e0631faf482bf6d5c13f365e12a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5750fd4b924a7ec35a8ac6c8a46313b4d
SHA15708e3f22446756a533a22239f579b5d119fec1a
SHA2566c631edbb08fe2a6621b383271ce9bae369202b59358533f4c831b312032c9ea
SHA512cc19901aeeb6083d459c4df90a3fcc84cd7e6f61335f5eb107af782dd8ad9c951d614a6e791da34c4920722f2ab48eb3cef50a2958fc19744a50fb184f889400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f9bd39e26fc3e5587ddd1baf572689d
SHA1f1d579041f719ed0994af513e3b1be10de318774
SHA2561092c7897e7fe224279d5c122998fc0533ba799d94937949bb72058c71751831
SHA5129723d3f61f9ac857614c9f5f80354a7f59b80e7bdc1615b5760c9ebde4c5d43127cd6e829dccc91e9e5c814033675c6a8b57942c06075b7ec5be1c30e07998ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bd3e02c42442b6ecff140ccb1b9263b
SHA19978829a2d9f5ba0c29d7aef16c58c9e94beeb5d
SHA256b25b25c72dd38f04041226cccaf355f31583332d161a0333ce412787daba7692
SHA512ce60d86847af9fa04c462c75aa0289ff428580904fffb35e8f97b7726438fb76a9befc40eaf7aebf400bd4c02164c844d17e75098fe97d3b8ad04e0119d866de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547320f9c924662d2d92dcc12aa1831f3
SHA13cf065fef05c72c314d770026a0f9584b027feec
SHA2568adc289dd5b473869c3651c00720eda28ff64f4e8059cc0479b0493008e742c4
SHA512804d6d7d2513b64fc194ae47f9998f4b54774d8f2f8ed419f169789be70fbfb5de33052c89b900bdab87a661f18266bfafe8709bcc72e7c0ad5e8233fc54b756
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E25VF8N4\cb=gapi[3].js
Filesize48KB
MD51f6b1425cad15c8901cbe7166c3f1561
SHA1e91ac716dd0e5a36b0ba6eadbc8fc7b53ab90d59
SHA25658afc1f9f962a40bd24bb910fb69367c3b0873d0030ac5600ba09ad995394c13
SHA512200600e714395249f7fc1bee2cdc691be63083730924a4ac13a5a7ba0caf59774df26dc7d69c2844e576c5e25f48566e3587ae3fd732a342909f2edd75f92f75
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YT4IJQ91\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
Filesize
38KB
MD5b9e08dd59a72c8ea22e04811693a8493
SHA10750dfb4139737204735c9324fb6f4224670be07
SHA25691ea2bfd9e1daaed97ef33dcbb9a1e609ce0eb16c73eda2707cb9cc9d31d9f44
SHA51238d81a1dcdeb33a596b190937219b9bc73576e0ad773fd11fa775bdaf8ddcb9634730809b623f94304a46fff547742ba0cd2cc4d746ae6a97f65e4cf0735899e
-
Filesize
29KB
MD57f6e82fc3b0359a485554607d3a45efc
SHA1c5bcf0d1394ce7a056fedbf2814ad94535d294db
SHA256ceb2cfc22328242b4569a2e75582b1152bb7cd515c55f47b0944a194c52541f3
SHA51288391a70f7996abeb91f220e9b226ef28679e2a380058554593ec03cce590fa30b0af361feba3d5f630974e554fd7eb737cd53fe84b85fc72773ead349b5d544