Analysis
-
max time kernel
166s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
12eaebe4ea8a42f683da22bef6c8c99f.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12eaebe4ea8a42f683da22bef6c8c99f.html
Resource
win10v2004-20231215-en
General
-
Target
12eaebe4ea8a42f683da22bef6c8c99f.html
-
Size
83KB
-
MD5
12eaebe4ea8a42f683da22bef6c8c99f
-
SHA1
aab2d676d1a236a5ec9abcb3375ae051596cf491
-
SHA256
353c7a3280d8ec0e63997b407a2b4a0ea1ba808115542de1e1ccdab1c0028b6c
-
SHA512
1adaa155ac65ed6fd610cd5edb20f50b26361023a63fad07d37e42cbe66fd8229c6fae8a47386b8147381c36149c43aa040be3c095406714481c6d6a583ed69b
-
SSDEEP
1536:Z/zN98SRdQf0NcNtxNSNeNBNYNoNJNbNBMxQ:Z/R98SRk0NcNtxNSNeNBNYNoNJNbNBf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E317DCC1-A897-11EE-B5A2-D6882E0F4692} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5064b5bfa43cda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e9178664000000000200000000001066000000010000200000003e304093aac79a4583384e426f87dbd5c1363682dd8b6515e9cbd79239a3621a000000000e800000000200002000000042f6e00344664fd07058f992a36bdecc58efb6898d8131d37a4a85c3aa9b37769000000046866507e830f15dfc5a21e15e336f7ee270bdbc1b775f26a4fa6459a67df82d54f37a8b350f55ac41f3406dd4f1a0dc3edab560792f42cd850a077b2eebc95c06725ceba1ee59af2fe350d63b34d5608801f88980fbd78ce2fd1c0e206b8cd76cf19f6bae0c9b39d1528c24fabc4778c42efe4daa0867f15685722542e412139f07ad8b63b3a5dcbfa56cf08b07a747400000009e7112475644326763ffc22a6ec7415bdece88454a038d3242a63b99e2db2bc94a1219aa571d3f5c0ead875fa8a12592d7d9088515da564ae2111ce8140d0b7b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410269961" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e9178664000000000200000000001066000000010000200000007634b5c500b8d904d600c308cff3f95f70403759915cd3fb9fa4c2bef4ea9c7a000000000e8000000002000020000000333703ee5053a753e6ebcbf6ede6dd51e3f23933fd99dfc0ac8c5cb22b6919322000000008823ec8aee2dc9b78981dadfd81dad78352acc6b0e0ac5f7ba579bb24842fbd40000000014617cb52a9680b16f6bb98b79bc1473cdb4debf91748714e239d52b1f32b1e13d9b0063473ab38213de4da7a6f3031eb9033e4e9d1aebb5a356ca147aa3664 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2948 2668 iexplore.exe 28 PID 2668 wrote to memory of 2948 2668 iexplore.exe 28 PID 2668 wrote to memory of 2948 2668 iexplore.exe 28 PID 2668 wrote to memory of 2948 2668 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12eaebe4ea8a42f683da22bef6c8c99f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5034ec3b760b9b922d37ec2d86820ebfa
SHA170ace12a56aa61e58f53ca2a3de71ff18966278d
SHA256015e7444eb0fdf2cae85aef5c1d3d1aee98ed7e692c848ea45bfec3a35ccd821
SHA5121257126cb3ffbe026affeb47918d546df4fd018b1ef53971bfa8ab53c67106d7dbbed03695340c8b5a446fec87ecd100f264966d934a0982586bc45a7c38188a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_2066BB08297F715760972468E8DA4F62
Filesize471B
MD52d1322e97975081745eccd18a28fe785
SHA1ad83aeb900c1c92029a9f710a3d85f3263b6e985
SHA2561f9a5bb2eaaf02e78e896cb7e3b0f68d2aab62b01e0e7ce6649d9830e8d16cf1
SHA5124134184cf7a5c815e4c9ac328ceb8a3e35911439e58eedd0995baf8e353b3d43114da1eedd0c28eb451bcfcdbe6f1d610815748b9b1a23d1d47d535a940e0e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5ab1b87e2af08002c046f7f8854305884
SHA16bf21254419ece152edcc00e171f9cc9f6be934c
SHA256e2b5112fa847536f7229bf13adb044aac85f8639d2f0aef51e09c110e7ac0d76
SHA51211da739e2bc480623b1efe4b490dd6d50a188bb40e3425bbb6493c93e316d5e0dbc2652f739825ac39279b4a6e56ea6510bf3a5e44ce5531d6a3f99e8649e2d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4ddcf05bcfd814452e52bbaebd781e4
SHA1bdc7552493638a9c0aed8d85b478c5ce3e2086d9
SHA256c7b68afe1ce8bcfb53e1721dcc485cf33ee9922f772e18a97db1713499a9d715
SHA512cf6c1c1a405fb9384f46ccc663311b85880e17652ae74d80802834ca44f8de87a36433316eb7585c78298fea54cd9ad87f02efee11c4e2ff99e487a96ff558fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546e68c7502baa93c6ba2e451ca76d5b0
SHA1e07dca0409835a17fc47b0f67e03e47c2e0fb65f
SHA2565332e647818ff63c2a3f9d6b3ec70da931e5087245336f74db8449cdaf1938ec
SHA5124930cbc975d678c2efb1fb275a95362cf008c791f5ea6d3a6a3a440af7193bfaee96fc022ade783b0ffd76b13e6931a927e3f1120552daaaabcee496e18b459e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af3decf2abb3bf5fad048f918f3f4939
SHA11125890ad3b58033e4d5e1fc42153faba272d4d8
SHA2567d685b103bca308d9c4c0739a76e8cfc81bcc9d7e4129708390af987fe618f1d
SHA512896f5c187741674dc8658bce88834d2555f1faaf49d46206a042420d6805035c9549a18d4d16e2eba16038f79a1c86a915d9eeed343ee13ce8015b6ae3bc9d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5129d870a04b48e201665899796ade3ef
SHA18d276d556a948985e43e2829939b49bd7283ad15
SHA256cadf34c7917a3f1d15518f28e3ab4116098f8915328abcd79a3e7fab27143334
SHA5129dd192fb7f01be0a6fad7769901843f103bea3d32764bb2111f49094aa5f9513380dcb2cd24e59c56e2a039ae6a5d4ec1cab695d90bde041caa1da534dc56f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed5e07669f8a873f0779230efdcabf75
SHA1a6ba15c657d10d503b942632e5e28fa8644206cf
SHA2565c081be2240594dd3e4605cc5caf9efb4b4e3db1a87136da2cd7127a54d1855c
SHA5127a43df7b4747624ca01505e5a1028d346e6b74a8e56efc7efb7467f27a0984bb03e626030a362d26fe9f71a439854c0dd44e8fe6ed826481558c1908aa48eaff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc0419434e83adfb5c850621f9bb8924
SHA16326381b339bb78f635f667e29329fdb558e1e0d
SHA25650910bdd647dc54b569fea0222b3b275fe983c734c832f1fee236352c8cb17c9
SHA5120ac935100946ed84ec167fddab878df28d7802d4c771595e613afd1a4de1fe5ab3a08e0cd628a219e910bc12143e1ffaf0a1dec2ddfa2594fe33339ddfadfb78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e430d4ad07d394241800869bb1e2339
SHA1c5062c98e36626e1657c8850d46d58702a5c3261
SHA2565f40a06421448ff76cee30478c7da07cc85383af2d242e7fbbfa2c3cfe97b544
SHA5128f0549b4be44265900a52a7aca8c7614e27111a0a040e93c35a0283d7d433f244d3c84bc24f2d92b4687d82fdb3a560aec02fca8c79b51e92de7efcd34296b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1e0c5ca1aaa6179385c133c14c052f8
SHA19c33d88148e56328501b2d31c0068fd5b488b951
SHA256bbfb5cd0e774a2a04eccaea240840792fb37a325f5dcab938a48353062358564
SHA512a411a477512fe8cc6462d9b152587a57ffeee43bb8ea5b5875776d0f485b6af0a21a94d07dc248d85660ac77830eae6bbefff595dc76ed3b68f895925e7f7f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51105acfa5721b6705fe49a9a877f6c27
SHA1468a1be66edb49725fce5a68844bfd739886a1d8
SHA2561fb0c6fc1bd774a0d7a35343d5b0beb297ddf54dfbd650347b087685e6d3d0ad
SHA5127ed65553cd559ebb229e33fe8d8977b2782ad92fad2d11b49fa73a6339687ae36c8b2b178d6bff28285640d7d23db686fe187c7d5112f161bdf87633ded37761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fc222c0a78538ac3c40eb64b5407081
SHA132effa0c3f74846b09a3a665e97015d391fe20eb
SHA25609c5a394499774daada2a56780c9d17e06e1dacb5137bd7602f1d4f779f70508
SHA512a063e82f7b0657e50ef2236dc2f99fbcaac2467f249ab4fb7ca301280153ecde51162f3882a5c1ac52bf2c4128569e7b0610ff895a8a4031f1def2275c847e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510b8e614bd3a52f6aff2d1ae48d6d9ff
SHA13f21b70776f722f48e2ffca80dcffeb65a09f7da
SHA25659706fe50c09450b38229af5e0d11a13738787b1e679996d8b4605636e22f277
SHA512f3e54e49479313d11616d804c2319e369b0933ca8969c185f3df617d5139b3a75dd31548a6c02a14c54d92dfbd205d9544546f8a1f152ee68959e0360e1c7645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db9ea6a12fa7204da3cab3e1f99a8100
SHA1608b31ead33a73392441fdb06354d385b6aba7f1
SHA256522bac9bdc3606af63c288db4cd250738105dda642ec244af621c105432bd138
SHA51251ffe6ad4f19948ec260c333f819885b2184e78faaaf6e66972aeb454bf756b8eade1bd8d8a99ff44cfe7c3705e3e5042e4e8af396e6b83afb288978fb9e679f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6ce2bfe274d148419e22cbf8e63c732
SHA14d3e8ccb095046d4f1b176cd6da35e6ee0773117
SHA25699994b76432ad7d1c7acb94e94c520fbf1377d9b9f1a0f86f35ea042ca26922a
SHA512fc5764a3b98e316dc6008de3b27aae4a471b0d8ae7235c93635f779780b4fb1941ff5e63559844691d48d1ad1092ba2c8e8547b6fabb129e5e1584904660186c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_2066BB08297F715760972468E8DA4F62
Filesize406B
MD521a07faace9cb654878bb46382d297ed
SHA123a4e2a4ce6037c4d4252e066d7abe063a99af6e
SHA2565352325ae9be372563a6c834ad7572e7465d115b1cce9ab96b8d3b7aff212554
SHA51207c702961f1eda709b936f0f3ae0d19b51a79a8492cc9e0c2fadd853ba2a162d8f95267eac4a4ddf01e005eee7c8cb9024e673b78a1a3ee95f2530b3fb5debff
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06