Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 06:27
Static task
static1
Behavioral task
behavioral1
Sample
1110573d04abf4650c48a8b82c775746.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1110573d04abf4650c48a8b82c775746.html
Resource
win10v2004-20231215-en
General
-
Target
1110573d04abf4650c48a8b82c775746.html
-
Size
178KB
-
MD5
1110573d04abf4650c48a8b82c775746
-
SHA1
ac0be7956d0478c7b5c6768c8b182b5d4df958ee
-
SHA256
57d058b48f187213048cdb85a192a76e1e5f868dd6a32d723b29cf2417327a8e
-
SHA512
6eb7d54d82247223fb2d33e822131000aeca6f1e26a2e47108106fd158a68f548d3104fb68a58e2154fb6ff4c7a198d98a06b8ece04de1cff28e9f9397d1d37d
-
SSDEEP
3072:yT3IQzomw7bRCo90iP4e4pU7+WvHY+JZj7h7u4beMBRrFX:uiqc
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1028ff65723cda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410248302" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77F711E1-A865-11EE-8CE9-D2016227024C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a0000000002000000000010660000000100002000000010e14b80cb076ce85580ae06854f22ff597d80be9545ffa2f49631d29bfdef26000000000e800000000200002000000076d5753e671ad8e81d2d8f4dcc9621a96539057f358675a9f3a5bbca1da5c75d9000000047172852b38f3963f0d4e608e40273c6aa83cf6f3b717249785c04eea0d56033933c30724cb048bb8cda9ad25d8f212f30640bf8eb6e9c7476b7a004aa9c8874a5ef428aaad5399e61e425bb46477dc400ae3a67b34a9d63d37d0e4fdc3e9ffdc554aa4ecf8cc1066f903dfac5d46a63ca29119dcfcf9468ab3d9a7661520c8ef755ae52159be40217234b1074bbfb37400000009c123d071ba2de19ceb29a153b61cb8ca238f0062b15fc084cdeafbeed9417f7f8b5d90ad735f0e56ec4c9d5feba202e6419a14cacfdaeffdbd9d3751811bebe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a0000000002000000000010660000000100002000000086aea39591140c1c0ee96ff7fc924eea352786c5111ce110fda8145df3c9e2c4000000000e80000000020000200000000461e873e3ce990f31534e5599d6781bb1738f6f03eab000de9596ae5f09fce6200000003cdb1d91b42d82cf373ffdaff7e5961d8ecab27bd3638d7802df7c3bb120852340000000aed250a42650848ee68fcf16a22a9826927fab3a8acfc86ecfc25acf24eb1d1d82b8d3560b15b10d192f6a515f2362c763f574fedc0dbf3502fdcb3e78a0e20e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1684 iexplore.exe 1684 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2180 1684 iexplore.exe 18 PID 1684 wrote to memory of 2180 1684 iexplore.exe 18 PID 1684 wrote to memory of 2180 1684 iexplore.exe 18 PID 1684 wrote to memory of 2180 1684 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1110573d04abf4650c48a8b82c775746.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD500d05bdfae83dc1a7581977aa309749a
SHA1ff38b1f051402e79fe43ce11739af1f10eb2af15
SHA256ccaf3f38f64877ad3553e8f7b568ac5acc04a1133ea462733d7ff24cf27b0ce8
SHA512b8aa97b51fb78d583511882ed90c9c1b8de17f5a5c338ec80b928d1728e923777e0b3855d6e71db0fcbe2fcdc88cfdff0ba36d55c946fa7b8e4e77fcde0639ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b50f5e93890bee280e4958bcc2926c3
SHA144d202ec6ce2c37cb99defd2fe38537c013430fe
SHA256b28fcf0a986cd770debbd5f7566b59f7bb5e564a49ea261bc2fc05909447c335
SHA51209921d1a63a056dbdbd090f3cd66c6c756675042edbc4781081b7d66d97688bceec6370bbf1967a299e95eedbcd40c98651878cf47af92b51387993aae3fa48d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574afbb7104252aafcc4ff7c2a295316d
SHA15d1a44ca8465add10bd9bf6b616321cf52d78895
SHA256c60d86669bed5e82a07102a930408931abba583808628dac3b71d140c8cadd66
SHA512bb1b191ca9ab82205acac78f5d5650802e205db9cb2fd09a9b34e1e621505f1769be6e02484544f3a94505fad5e9acbfc8639ec0ab177b994636c7c43caa58b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1a6dccf00b5041cb0678a7883ab96d7
SHA157659ee647b84b59babee70916e3b906cfc161b3
SHA25678a2379f165d6e115a725aec8ddbda386bdc8c3230ca973eb6963bfd7544d3a8
SHA512ae393e480d071414571f85e8bf832d58d4dd92d0aa77c48195b4365ffe3eaeb7e96f41455cc290cd03d0a5f9c2e1ecf1972363263f0fb595ba669793f8931bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7ef2901cd5cd1d5fd45fbdb986557c3
SHA1725d1358265b31191713f8e7ad72e75bd64867b4
SHA2562df49202c1cf2f368fc9ac4ebd2cc574a65e7eb90ea9b407cab00f6f29e6764c
SHA512fb364ce585fc4b8c77b69ae8c4d79f5f02e6c71440356d4496c448ee01ac70894545fd2d1b2e2460e32f56935446b59fba87e5f0b109d91ded81c9375c6fce45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfb9795a1e36a6b4922787f4b32e2b18
SHA1d11a20a2f57033212fb313b60f2c22d9f0d1b0ec
SHA256f752a08a04037e28b3e19a24f83dc9aa1415707856485ce902be126a51801009
SHA512accfcee959e682c95f5042130be0cb5b0a9f3150db85353434f09d7b57953344a388454cd47f5bad30d3f91f4141102f723287d839b506c9f489f1a45646e974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5998af6e682684f805f4b909c70803a06
SHA13be0ae825483ec3ebc09a8f70499959a8fc234b3
SHA256260bb6730866fa845a1ce9adbfb0015c43c680e48baca184f61a45ef86613e65
SHA512c2f10a33524cca9be45f759fe6ee2b0de2fb30e146b0fa29a9c5a40e037b1b2f64f20672a29ac997753120cc9e9df12007b51aafb7dc6d4394039992bfc97f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507963009fdf7524afd87f49889817c90
SHA1e71fcfd7bf7eb0f456a0ef946856c75cb5a11812
SHA256789b940397d1e9c679e5f61954c41f4afeee11567e7d988a68fba45b4dc8e84c
SHA5124a5d4752683cc3c3ef3f81efa0a7c457b9928793ee672ff9d67bd9f33773f6a237039505eb81d7bc4f926c414e6f82cbc5407f980ce2da217421e0fd7175b9db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E3F2LH07\478691279-postmessagerelay[1].js
Filesize12KB
MD592169c8a0fbf6e404267d0705cdbdf42
SHA1a5cd88b74ca5ced239cdbfb458fe25540d671f46
SHA256dba668b49a111527aac8f616b9053ea57c944e01a84ebdcd02a13da921223384
SHA5128c5d35ea512fa7be367cd9a9ded2f23822dcce730e5502a355ed0d48949ef763eab13be0d50a66de6b0f8419d6a002c12c4ddbf20d97f5393ba922e48a4f02e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E3F2LH07\cb=gapi[1].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HVBRC7A9\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HVBRC7A9\rpc_shindig_random[1].js
Filesize17KB
MD5f019fdda31635d2a31b151ad8ad56c7a
SHA16adcbec55f66ffaef83d9a134423aa98eb2a2189
SHA256c7fc0b1526533002c956ebf8e8c42c3ad3f96c41ace73fb4063cc89051944831
SHA512fc278c12316e098976833882a38c788d812f9d36bd1b9b2b8c87dab4dc906af26a860df95436ea1b7d509236d44d0533d475a153437f8f5d42653fc28a77ad64
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06