Analysis
-
max time kernel
121s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
0fc8688086d8d90e747201e3bdd95417.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fc8688086d8d90e747201e3bdd95417.html
Resource
win10v2004-20231215-en
General
-
Target
0fc8688086d8d90e747201e3bdd95417.html
-
Size
35KB
-
MD5
0fc8688086d8d90e747201e3bdd95417
-
SHA1
d0d4173cacc0fa4cfb10d5a9102e1ce17760596d
-
SHA256
c722f81cb91bc39d71fcec98f7a9b1899f0ffc21ee8b32153ac663e596c192be
-
SHA512
7ef4e4bc52fbe707ff5298eb73dc85e70d954d0615b22676384b95e15fc543214d4b6479d3b76546b7905af39ec82c78f0833417b931679394ff8b4a4f8a244f
-
SSDEEP
768:WIRIOITIwIgI4KZgNDlIwIGI5IMJ7StIRIOITIwIgIfKZgNDfIwIGI5IVJ7SJOxb:WIRIOITIwIgI4KZgNDlIwIGI5IMJ7Stq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{564221E1-A840-11EE-8575-62DD1C0ECF51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410232350" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2796 3024 iexplore.exe 28 PID 3024 wrote to memory of 2796 3024 iexplore.exe 28 PID 3024 wrote to memory of 2796 3024 iexplore.exe 28 PID 3024 wrote to memory of 2796 3024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fc8688086d8d90e747201e3bdd95417.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8fd2b252d73b2b9a0db13745e5b9f27
SHA166b793488481064b394711bffbcf55e5148084b7
SHA2564be29a3324bddaea2b26999a07df8e29e2b90d8d6a956f7bce20bac2bcd98b8a
SHA51238c871b32a53bcec8244f5e23d04a04dbbb26b48c79b3055cde229fb31f4c996ffdc7aa0005827bdcf6cf829c28362fb239f011aa4260c31f40e66f57a110bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a8fad5f6bfc9c111d6cae143c27fb10
SHA1bd23e2c421becbd2d777eb7ec22ed16b9f671bb3
SHA2569b2a5b1fc175ed7fe454536618b713ce2c10c0b06ec7fb4ec01b38de08a816bd
SHA5126d3f123353630562bf1c0eb838babc5cb6e997e9d3d2e62c2e093838159b9354eb26ed99b5c255b7862dde9bc6279b0ac1c0027cfc0c9b5a79da05765ed4861c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b13b7a470a28b134f76e5a2c110ad8a
SHA19c3659f3381a3511c0432b8469f4e11a293855a2
SHA25629b4f6f03e46564cffbc0bb6d9527e00d0aa13a4621e6794005beee73c9963be
SHA51211f89bfe5bdc8085f2bab9038c2877d95d6e4787e4820ba77b80153556ed471c18ef3b04fd1b1ced67cc70b7de33bdb973baeb69fdfec877d71bb7570748e5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e39f04d014da0d3f4f11e7496f89a618
SHA1fde143ee9c71fa564e4ca86342d7fcb0636eba95
SHA256b241145d04e2cd064187c56402452e96a6bf9461f2df3a118e02d634d60f6f04
SHA512d072ae4ed0b1ac928adf84fb06a3a0756691d760b30844f4551771e259168dbbf47fa15b3790aaa259f7d4726afd29eec5620b42d3ca5136bf539112cf46dc56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fb2d6b61bffd7ab40b225e462a5460e
SHA1bfa69ecf4c4ba28574c459bece768a0a6a43a1f8
SHA256ecbaafc36a94a34594d9f01770f3e671a42e3f1bee070121d32b3cba7577374e
SHA512919260342082f1c2482a15d4875e5932664c12e4b6af3d7a53c189f0f6e55045ddee81cc7cac79bd2a35476941a1771455cb1c26b4e017419c0359935c3c8a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef749d0eb483d30ba85dd982fd443415
SHA1a7ad8ae2d806b2dc7d0c7cc15fa72860eccb5ef2
SHA2560e43379565cc781b07ef7f4e4d530ddcf5187fffc542674b0f7425383ad57300
SHA512db0a0f461d6d8cc6923d87a22ac27f19702346bcd5c7f39a49452f7e12be4aca5b02a993b8ab8a3e6fcdf841b1e200d31463416f9876e13e40cbf9094f147bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1e20c24eccdd8d88b638a945ce0728b
SHA10e8c39664984f8135c5020ab9edd49d5e1dfe679
SHA25686d28856e874025382440651bb334e0d75fd9fbe3b2b8e5d8224bc58ea869923
SHA512954b67fbc75496aadb39f1b54ff5f7799d12ee0d73ab384d8ebda36685ed224648d68abc1fd4f28080520085913ff67eeb5344d6b1d7328598d038dc7b8c05a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d73a370a6db671241552b46e2b4e38df
SHA1c9e4e5faca3466a80a3dd0b592ebe714ac302549
SHA25632f8bd70e2f5eb6c93403ab4c60d1e3a96e68b9bb847a8a6ab02ed9ba496dda9
SHA5124b7f826b2c255866f584f50d4252c8d8a5557e99c96756bd3e59574d6a7200e9d7bdda2f90e7949c27c6974e575f47bf787db737cbc29bbae68e16ac828a496c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06