Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
125cdc5ee7ee19280bfc53d51e7391f0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
125cdc5ee7ee19280bfc53d51e7391f0.html
Resource
win10v2004-20231215-en
General
-
Target
125cdc5ee7ee19280bfc53d51e7391f0.html
-
Size
432B
-
MD5
125cdc5ee7ee19280bfc53d51e7391f0
-
SHA1
560950f9aa20963d75b24042327ed1c6c690585b
-
SHA256
8caa0bc10a66689c1eed4ef4279157f95be429c088994d7762446c71d1d243ef
-
SHA512
793434103352450f7881d3585161f0cdf2b26c745d70c7d4ca17c67e027d0a273f896be97d63eb513660d60ae45eac4152b0b8ef27a64f7978202272bd7633d9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000005b4b29dcfe6a05d99389cf8869a4c06d374ab8bf4d0ba189d3d0dfe1873795bd000000000e8000000002000020000000debdb60812ef40e5dad43c14be8446107da18d8321e203fcc093ddd4fe07555f20000000fdd07344ce51f888b96a364aa17ced1c0943d3cfb27ed8fe5898c212f68edf9f40000000f2a7c995ec02d542ef0219e838e818807a8c4bdfbde8c81df8d3690bb6a25ebcc514cc9ce52cf46e9eb713d82a62650fbcc5b19ea857a29193c7b672e1f8b66f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c12d7bb03bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410165071" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1D83321-A7A3-11EE-9D00-76D8C56D161B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1700 2288 iexplore.exe 28 PID 2288 wrote to memory of 1700 2288 iexplore.exe 28 PID 2288 wrote to memory of 1700 2288 iexplore.exe 28 PID 2288 wrote to memory of 1700 2288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\125cdc5ee7ee19280bfc53d51e7391f0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d4026e13ebf397273d5b7008209bb57
SHA1bae1848839c6d4fd21c852d290f8644b76b0aeab
SHA256393b61a345c84e6c590b3c6d5f9463918ea9b1ade38bbcd5ca2c670e32bc8568
SHA5129a24d5691928842e3b35bbdeb985ea13b56c3ebc98f1c96c785b8341563ade7b90cc52c8687de13f038a688a9d34e7e2c0e9f27cc2162f1b9a7e34c5ca1b661c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54af3224a994119f27c2d5f5c03471044
SHA1b4d3d8f8db240d19e3c11d296ca7d5c71db2f959
SHA256d2917013f0b73baee0bf672acf0c83af6d97bc6cf2200935b50839175ce62ebd
SHA51205d44bfe664687731d6935659dc04b36b2d5897c5f76106bdeda8c193e844781c0bc4d5cd07a7533bbf72e092717c82d45bff81a1cda3bcef8b7f20749253ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52915bd309e539e872c52d12d228ee1cd
SHA1b0d4c7b752e729592fffcf1fd5744e6d74c96a67
SHA256fc4b9cb53d3ded848e110daf5b2ea87eec31f3c59f8717b48bd3540e783688af
SHA512ef3e258ff173e638971bb8e9d70affab075170e2b150327250f559c00a8abe45432dbdbdd869390ba968bc2d8a8b037c45dd8b21f63ee9923c7e2ee8ce40e674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547e5038d3989bd29cb983eae4fe7c1a7
SHA1bd5b0523d07b7a14d82d26738d4aa6769a6b63d4
SHA25659348b202b929674cfcf9534b7c1b2cd1d365794f6611e21ac0892fc3733417b
SHA512228c3e0017c9e9bb6ffee2870f099bcba1eeb9f400f0a0dd5293b5c99d676c3f0f4560b33c68d97eeefe76181c8c632dcbc5755a4f48bdcfb920316aa52989ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2a4ae4ac1f4b908e944619dffda556a
SHA1f909823d515fa6060f72bf20bb08857017f5c850
SHA25622bb996033eab8eba042d07dbada3382c5f1c190f754d68e77cb3260c1e1c7dc
SHA51294315fef02838cf0d76721f6ef2ed5d042b6e8a4c020256dec5000632ec6547ad6b4da3150b7ccf3fee91734d7350adae2ff2d9c051600477d2e1d829bc39ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ae4c6bdf89f568d52e3a21d21e35371
SHA1c8aded886589bee0cf27bf717ec51ac1426e8a31
SHA256bae1fc5a6cc55da96ef387b157879c40a83b91704969decd1766a68c95835167
SHA5124e2b085e924ae7aa67d032f5fc0b314d45ee399725d027803c144d94532e66a483a81966dc67c7007d5d161b3c403d246139178d2056adcf2a25de6bade03ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec470ec1478112966ce1c3e815abff06
SHA1679c37bbec61221da2ce902a30ae71687d242f7e
SHA2563b0f30f0bf104b17740b2f89aeb86b6617a3fd0281430c50c22d0fbbd3ca62ef
SHA512e413b7b3ac209177b377974ae36696e79fc857230e46e8b606ef79fdd879e4eeab33f5cf5d1e6379d144a1c7581e15ee0dae1a2bac206323aead3b1f0092e3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0acd78f9f9c2ebc61d482f9d989058f
SHA1431a62a643b39a5d7ffacbe3a43675c5c47dcd30
SHA2562561848257abebb11c3325a3ba542d4761ba0c30d04e31b65cdc0908d58b6952
SHA5124489f6910cf7386eadb4de95a58138cc5f3a63e71e67b7a2bb6d3b4bb6f69f28cc37e56af80e5be5965aba3dea9a31de62a26cb7a993c892308872704a38abdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553d47425b6dd975796583e864bf9232e
SHA11f1a2c7f2f35df670f69a334f954a2b11be426e3
SHA256a3d8dbcb302bf3cd93ebcacdc1b28ea4cc2fd817fc0a5c22fe1bcf73219d5b1c
SHA5123588ad8834c81a95e70f419bc4e575bbaca031603775d3be9553f3c7ba243cb0ac376876e393115e9a3a932c331bd814d084c799028ba4a1f45f3886f25ef7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a413c7837ade44a1d78bd02e6235d6f4
SHA14e022769ba0252a7b43251f3f810e9639c028992
SHA2565173b59400faa562863ae74695c9c2eef7d1820ed71fa2a160c8ce11a5a88f04
SHA512feb49370127f7c81001113b082ecd2b5b765604dd592243cd6ae7b8be467b8ec13f757392e7d4fa623509d50572243ab6d16be2cc4b845e67832d16e8b42a4e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564ceaff5d572db8d5ed371652ba23c69
SHA19df1a0fba996e087ea293afd3a96dcc9d5f8d513
SHA2569bda34fcf8796e67a916d7a792983e516b528ab83b39a64f8bd7ab073ec2f291
SHA512b44991b609e7047193755cb1156e4cdf2752c74f163f3ca27e3a08476f0ac4c2664091a0e1029945f85ccd5ccec966bdb520078911def18bf5f732e80992ac63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510b893bc70a1a482c9f45a3b00a661f4
SHA13b26fe378a51e90a0184235d7bb19ec5cc0627ee
SHA2560aedb2bc54036fd072eebae1dfc061bedd7d190074abbdf8f2511a1f9487a902
SHA512201f5bb01f27ea2a5a96fc535c01b9119f9b1e5ba67e7377cb7740e934f6cdf84e2a6f250c9ad4f11cf6a723ca92eee84867f934a26d803a37aa94fbfc37a024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55152cbd9200a58e27c69fc62b4177e13
SHA17344ebe87ea6d791cd928ee9945aab3b7540f8ae
SHA256bbecf76bc341b76cfa0cc282d35aee397f6ae91057e60b401ea5cc5919352625
SHA51268c4007070f1beba364011adcd310e7f46998b0a3c348050c14eca17646d7ec22001e79f4966815481cdd247fdf642feb3eb279deee78438feb665691e359084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2e0c95978537b5322811f6a952e6a27
SHA15afa6bd62c46c5a26f9f8e3c7374283d33ee0827
SHA2568066b162a92c5fcf0a2d75decfb02bbf9ee0eecd6f1a39bc52bf9c1b2d1db8bc
SHA5121e59ba8c02ce49ed863a694ad1aef3580d775240472ad5ababf3835d79c49124c9187bf347465d6dbc4a2edc0e85e40149b77c8a87703b80ed65fadbe58c7ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507e59d083d4c2516618606ea708a8cfd
SHA1c36b6f209c861556407a33f8f0649af6589ebd1c
SHA2565ed951a2114d294e731f5ced66fead52c547f7078c328578fd24e76af5501197
SHA5126a90a7b4487f61730cd1ea9dc6409dd5f66b7f220503976f6cf48f16ea44400ba89f95f8e71b267c3ff3a727eaf48c59f5f67bace892932d94c295c28d779f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b795b9dee1453d021b934597a284a9af
SHA19ba82f35bba3931980fb8cfc48a6082f2229fa4c
SHA2569f7723d5118e0d5c5761f9c058bf297031bb43f7cd4115b9636f77903dd089c5
SHA512bd6a626c8baaf278338c60629a455ccaa5c4ace667751f1b6d9378e595fd5b507a21cc8ae6154f58df47d6e4bf656781ac1fabb4bb0bcf62ed3eeccf52e1f084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5828ec882f0b84971e6609b784e889c2d
SHA19994cf2514cfe478b77d9d69b2aa0dbef5a2dff2
SHA25612c713841766c546a1ceb77b39448c20f2ca36b08396024f286d086f4fba9890
SHA5121a1f5914b12bcca91cf8e73d516e92cf892e97be28a4ed6c0a7035c496abb2d19c9ad7ed5dc050345032027403001636ebd8f329615f6f0ca7f8110add013166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5319df6b74c7ab97f9274826e6ab82da0
SHA160927014816000b24d96c48bb95431498db7454d
SHA25686271f919a52d6416c1e142ddcd5b9180ebe83afb4279ce335f6035489c430ed
SHA5120c5afce31984ddf04062cb931ad42db2452547fd6289a33c03dc8fb8fc9d361254b298c97ee3b550b64cb2a9b96097af87082d050c9d1ced3dafbb73b0862774
-
Filesize
1KB
MD5b7d5bdb213671173cddd560bf92d0b3f
SHA1915504330bfbb0bbdfaf9df4c09651063d6f841b
SHA256fcf382bcf31ec4ccf927384ac9b870cddc24e8d7cb4188bebd06cb0c67c2eb01
SHA512aa6797061c23e13dc3f3cc2b5c34bd0691d6f48398073a4fe684667a479f836a7d7df82f16123f39372dedea520e234286d009f7725fc72179da3f1d0ba55231
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06