Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
1286da4e50ac633fd6983b4878a1b2b6.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1286da4e50ac633fd6983b4878a1b2b6.html
Resource
win10v2004-20231215-en
General
-
Target
1286da4e50ac633fd6983b4878a1b2b6.html
-
Size
432B
-
MD5
1286da4e50ac633fd6983b4878a1b2b6
-
SHA1
5392f46b52568ddae2cfd83a9ccc20cecdf333e0
-
SHA256
8cfacf1b2926a5ac739b4da9ccea6cc3162df56a30837de9d8ecb7446a576a3c
-
SHA512
fef9a88217c32162d847b79c40c5ecb1aa2f245c57c8d35273e11f0c366cdbcd99a28e99a1952abc4d59492bae40cbfe2d97093c9f78edad3eea379060173767
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f120000000000200000000001066000000010000200000008570e44cfcd97d4bc4578e6d8708a04924a47978689e8dbda149cace69ece4be000000000e8000000002000020000000e59a17c2e955c65e0a0965b6f973d357fb3c7b6fa47ca4b59ef85b0ff7fedc8c200000009384270b2cbdbec55c1f2f6705571db46c670d47ea76d366941dd27322a5863640000000a853d06affac4dac1d3c6bf07756b0a7f4d37572d044be1979315c5863a9717e59dc34d9dba9cfaaac7bb4c69a0daa0953e3c296397e25e876ba9b595b81e69f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D82F0B1-A7A6-11EE-834F-6AA5205CD920} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f084b762b33bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410166327" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2844 2968 iexplore.exe 17 PID 2968 wrote to memory of 2844 2968 iexplore.exe 17 PID 2968 wrote to memory of 2844 2968 iexplore.exe 17 PID 2968 wrote to memory of 2844 2968 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1286da4e50ac633fd6983b4878a1b2b6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db2241e8c85f125a3b752fdebc69818b
SHA1a37eb4ca9f3c5c586b590112f28514fc8f7d1ade
SHA25640105f739bacd9856b7de4c69c67ba01b7995a39ac2391b2ba11b927d50616c8
SHA512bfee7f492c09ad0ff8d862dae17fa5ea69bda80d166a03dd0a9bc9156b64c9c5e59501b8b7a306b5d493c5c8bb38ae6ae7eb9eeab28d44298e573008d9e33136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5707522daac4cae236d058d2afe183d7b
SHA166feab2a7b8151cd13e0d3f19457710b527fc834
SHA2569f53c08e1c99a94eabc41bcd1d81924ec74d0161d8ed5b4c9b4e2dad3cd4b37e
SHA512b0887eb34ecd93e389f70c5a01f650ff77d7b355f020a03aec6e5d8b6977a872c29b06173c3cd12ed58b9a14f9b22aec73e450a816f39bae24898d4f9e0e154b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dda5215c5992fa5601e30a101ffb168b
SHA13e1b88cb26fe1f68d95368252828f1e00fb4dab2
SHA256046972e312986d7162a81543e6618a81bd6ebdbb3d58d92b4a2772db77207efa
SHA512b2f4f9d47bf0ca36e53ca462ff0e29f7ab3fb00bd91c1da0ba8fb6344a41b00baafe9cd740a59c431c09d44ebae3a42033672a4da7c768162aed7dc41c0d45db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5342d28a74abe6d757127482c085b1ebb
SHA168232b116d1c491d4f1439be1187351edd16ca2f
SHA25648beee7d8cb725ae74d28be8a4072612db72a7876c83a03fc383248e2b683325
SHA5120316946402e24eebc6535b6e4892cfb50ae127564d86f2778a10113b72c32599803dd4086eb81a73b305432701541ac89455207212da3ef83fc615a08c5e6595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b0a624d0ec3bdbeb066de947d5dddd6
SHA1998dd649df5e4b2882970b8ad6c18168429bf0ef
SHA2564d35ceecb8f7399a56512f5f8f041fd9e715fcd2d2dd0d58730aa7ace2d38c3c
SHA512874bf037a7b8f614aa4bfdba85b19cac3f1c07a3b5e81723a5b2b44f1c48e1936d8ce50b44ec0d5464cf8e1fae90cd391fac0a8409b1fbf21b80b34683280e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545b8af14653c44d8f7a0d1de62fcd3c8
SHA1ed2d45aea7b86b7fb4a7605c34cb0cb5e5a4a19c
SHA2568b02aa5aefcee2bc38f3b4434f135e646a45c6e3d499e99029d68b76266b6476
SHA512b5b705a7f44fe4449f949be907c356c50aacbca330f666603774301994d12e5b74471b38a9f547b0c0e027e4a30170ff98730ed34c44fa414bb6e6c365e58f8d