Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
10b3455330f15b54da1abcf3e2ae69ce.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10b3455330f15b54da1abcf3e2ae69ce.html
Resource
win10v2004-20231215-en
General
-
Target
10b3455330f15b54da1abcf3e2ae69ce.html
-
Size
57KB
-
MD5
10b3455330f15b54da1abcf3e2ae69ce
-
SHA1
39b4408eb63d48f2459adfe47953dffa209dcd00
-
SHA256
91129bac2a325486cf588f012ca1cd1c1a1a8dc35ce4f3c5c3add1b34910aa71
-
SHA512
4529ca1d19cdebfe9eee06deadd277d732ff859293bef8bdcd683f0593c7589be61198a2974ccce247cb891f37fb01a376e8f513c85cd292e63709ca28526203
-
SSDEEP
1536:zS77HgcHv7oOLjqV7HRlvNPX3w5abFvbO2KZM7nTfS6185zfFMB7hR3oO1IRBt:u77HgcHTPvqV7HRlvNPX3w5abFvbO2Kl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410152519" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78F4BF51-A786-11EE-975F-42DF7B237CB2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000006ce106e572c0a9b36a15c404e6bee0ba69445b916e73fb7839d2eba516f398b2000000000e8000000002000020000000a9d3a914d11e94dc865c8a7502464465683bcdd7e795afb5c089cdc455977e812000000060e7b9b94a94dc55794b4d2a53240c21c50a76ab72c524ba186cf762ad2cb394400000004bd07eef8d611e4a00b85cd3c1f622584b891d2fcf4b5021e7127834ed92d3e3aa8a48cde647c020a61649ad6f9a92a9f4630de96ab3786141a6b94a690ac993 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800a515b933bda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2940 2332 iexplore.exe 28 PID 2332 wrote to memory of 2940 2332 iexplore.exe 28 PID 2332 wrote to memory of 2940 2332 iexplore.exe 28 PID 2332 wrote to memory of 2940 2332 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10b3455330f15b54da1abcf3e2ae69ce.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD55684d17c19c43c9f1cc2a8d6f645e060
SHA142545fb9d911875f3f55f23b03a7cdeea158cff1
SHA25669d08ba46c1be6a15425950f473f64451adbe8c8b395adedcb49ec87a556ecb0
SHA5125b495352902f0137607a92326f51197363af5b53c268cef344ac8d16f4abff3263b7f1ff2cae88a0dbe62fbed9b2c54d6eacfda504d79f11ad930d1adab86f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_1AE11409F57BC5D68541053A9AA94231
Filesize471B
MD5234c314ec43f13b83d23a4d4c8c03850
SHA145e73b1891aef2eb4a95ff43720f61cb0d4c7afa
SHA2568dc976595b63fa7110dc0fbafb948471bbcc4732a3715ccea850b41070f90f56
SHA5121a8e2a7b360e2c0b3a6e6c8bdba4cd7470f931630059a28ce2316b54ed0d37db035756922648d976504407e7222c1e21e44ec6011c96601e4757dd25c490cd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5bbd9a72a849c231789dde73ddd8e6975
SHA145329d87b942b95b4684b602276b2e232c1f5e43
SHA2563167b91e4b02b0a88b838188996e4e38e550ca89d713fdaffdc4d4c53c4272e6
SHA5128ce756e19595de900c9bacc4686d105bd1c821f3252e10346da83c3510c1ef2631d4230146fd482b9bd6f185a64a7c6b852837a1f9db7ce6f5fbc4145313c3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55573de0ffa166a3c13ad2f182a758275
SHA111e383d09d2938c6be689f60c475d6d80d60afd6
SHA2561085308170f2bdaf4481459b5e5271e3e50c1c58958d13d0c759ebddd88a9d95
SHA5128d67310e786efa2eac0e9395f69d9b0b2c4aa429930b7a6aed4d28707d30ef18633580a482ee676df914f6f094a6314dfcbeae343bf03228602e0cb5305b81ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e4a2071b2a9f26c4605885c2306de74
SHA14352519c70547cae2da0c745aeb0f778c931f387
SHA256583853efa9f7bd7cf2cf2a89610e8d310665df4fc81937cf4c05259b75888099
SHA512ef294ebbf04bf3caacbb26f086e3c37fc248c295b7fbd304fb18338c80f6c23f257af7fcf22e60a0610cd4b3ffa068b299e61e08e6cc09cf714aa6abb3f790ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b7aeee36074ba578f405a7319df66d0
SHA115356cd33e1248f45cbb354ebc20e2d7fe208e74
SHA2567a5b1ae7e240681b7722a8deee9c47eac7e2e23014388b14743ce27b40c54a8b
SHA5123c483644b23dbad06c3c8d7476052a332632bb111a77aa4597fc6e45be603a355850d8dc8218d9f7fdc34ba854adbb80803d78e07403e3346960356ea686ab99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b83da0504dd33ce92d6f1cb8e77c419
SHA1cf593469a31e2794a0a7092307305c98d2c65f26
SHA256dfb7cef369c3b7b0a873106575fb6b091e1a2b7dedbbbe1a0717b0d5b68c25b8
SHA512cecf9606f6365275c6bc57465f69b31dadad5cbfec6f040198337249d98a57ecef0d304881f5decec30bba571ff095d9fdda4b44b3cd5be2384a74f0915da5aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4a317ce86a26410c2f998dc7a8d05f2
SHA1a539f3f063f7d8fe6328cc44dabbe4f596f97bea
SHA256ff5d8276cace6ca4ef045ca3cf8e21ac1ae860e63a9684e1b9cb50d99fbe1309
SHA5123d539f6e3574ed54ddc606e240c33f7a6f0cccaded321a38e114e9466343f26a4e55e2cbfe2e24d0948b36e3b45a82b5878ffcafc64a7f6f4d0360b989242aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5a954a20362f148efe9432f4ac15015
SHA1cdef6e41988bb96cd97e7b98eef9a8346864c0d9
SHA25605e2e67b44d6630c5b8af8b54f013c1beafc69f7f80e160c49e915deeb7749cf
SHA512930f053a8a92697808ccab498cc81a83fe738371332886731de1391da23458cee6a23143c25a087be88d116a87cf2e7934f3979880869c5cb8e7d820121aba3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5736bba6a90a2a847099b28a4c419349d
SHA1f81c10eaac3d292209656219387f6037ccbcd5b1
SHA256e4afb543c259ca08fc3d732ea5ea10f5d620011ada0d23bab3b2cfc86540a9f2
SHA5123d5d7a3ce26db151e3539f8b940e6d5fd4ad79c81682ed2e8b953e6fe26d74b3f9368dbd930a74a393c61e8b1f171f46b1c8af784468c0bb3c438961ed511189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590824ba493a07929a280262c43cc4278
SHA1c36f220a663ad597d5dca9a93ffd3336869e528a
SHA256bfcced272246882f843b1ba7240d2e85e5fed88588365c9749936e778dfc23b8
SHA512a4524338742223b0bd068893ddccbd69aa183c00c6996046146ee84bdccb7503285b428887d090bcb8da90b59c82d58763c72bb4d385f20c4d6983ac3a93b82b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b810cc2f65e09564a195ad0ff64f097
SHA1527306d289d47d9683f040c3ce2f6cbe188182df
SHA2560a8e6145fdfa8f1230b6939b73ca50fac28c717e008fae381dcf514449519ee9
SHA512b197ea8f1631eea0dffbfec649b78080f455e31f084ad18c968d7c2811b1a588be105ed6e6b506c38daa8f4b94f62e3f5d7d7704d67ac367711baa643e5ee207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd9f5825b139d9dc34904dc089a22fb2
SHA17f38ac9021cdd43f7bf1d1a1158dde93d0044fad
SHA256571e583fb951350c0b65a06a73d9b6a68c813dd70680e4ef4ad221f0a053d33a
SHA512ac7066d9a44440648cbd59935544a6db8ff9de46ff22675ac743a1ebc1cb08d7752c775cab5f47507824ca4774102387ba3e3a94d8a3f517e21b495df1bcc9e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ae59101cc3df72a7238bb14de9969b5
SHA1a1a40d0040d9678a0fd97f2d9001a77fe72e8947
SHA256a8e6dc33191e58e400c0ef149bae685901d2990c33e264c0c655e427d4b249a1
SHA512ecd6ea0db50efe6ba5479c37c38c1b2185d0a0ae1058011484fdd777942fc660a6a97a63b3a0b4e5735341cc61a44d0a811af7cc2bb8ce703cf674fc41c3d6db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e351c7afc22fa2243506bfcfcc9d1f3d
SHA124a979f6b29aeb3b6815399ad201781d8db61a8d
SHA2565eec4f9ef54266bd8045e5d444b42b26c5924fa6a54ae7e254e90c4932732e5c
SHA512fcb03f8939f5278e814b9356b89a5c5e3354d618486c10e57f8406887d0e26035e30290225f6eb040e29658e2eb0817eccd7a074030d78109a0c84803cc75493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5c6b630040ebb4c297ae9bf53f1e9c04c
SHA13cf71d883fe5ed2e23630ab0bac6481f9b049486
SHA256dad9817b87997534716ef630061c7041de2bd748e091ebd112914b6509141ca6
SHA5122da84170ec6998cbb7c4a8c3c3097eec2f774ce6ba4c065a5e7cb72f8837fb7cadb0ddc1f0fcfe1622635a206b3046b7b3325bf72847d15151978990293d6c89
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D0I6KXNQ\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LAJVCBJI\cb=gapi[1].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06