Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 08:05
Static task
static1
Behavioral task
behavioral1
Sample
12f59c121963b864bbc15eadcaf703ea.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12f59c121963b864bbc15eadcaf703ea.html
Resource
win10v2004-20231215-en
General
-
Target
12f59c121963b864bbc15eadcaf703ea.html
-
Size
33KB
-
MD5
12f59c121963b864bbc15eadcaf703ea
-
SHA1
6b8754b5d6872ddd09a52b04a6de80243caebbbd
-
SHA256
41b8412647f62f69ae57a32c1e479da5795fcfd5ae237f6f35705de139ab4493
-
SHA512
603c938c5ce2a4c5546cd743fb34c5f4351b54ae3af39758bb2c111f91142d96b021ee11825c58c03a4b06d7beaef02f0eb28da2c2e0a0f7b8fb3040c92a57fe
-
SSDEEP
768:SzkzcyJ/6+alm48vRkaMwI5ckbIuFcbIB3IfMcaPB4r:SzkzcyJ/6+alm4ykzwI5ckbIHbIB38M2
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{280B06D1-A899-11EE-B58D-6A1079A24C90} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410270501" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2344 2372 iexplore.exe 28 PID 2372 wrote to memory of 2344 2372 iexplore.exe 28 PID 2372 wrote to memory of 2344 2372 iexplore.exe 28 PID 2372 wrote to memory of 2344 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12f59c121963b864bbc15eadcaf703ea.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f033a4edcd5110899b319125b6e05310
SHA196aea9edd09730e6e5a01db1f569780078c37a2a
SHA2567e72fff761d18999c15cd0a35bd189a8848c264b86e27a0d8221ffb8da1ff0c2
SHA5120ed898c0fae5e6cf33fcde7f517193fccf3935760933439a2fe982fbce9dbbc0f8c4d8b736fdee1c6a0326d0b81b3e9d9e4c95332f207497bc816c0ead4eee71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ed321bc0e4f477b5435b25db34ef4d7
SHA1d73eb4f833f7feb52a3a65459769b62f80dbc076
SHA25638e1554432984fc4456f1b85d59a122fafd10739fe815a97ea3454c5570ef01b
SHA5122509346ad41248fab8a90b5783948591dc95da781cb90dbac348f26e0e9c62a6f5f4f9fb6fc56c1717cc1066d5501e818d8b09f4acfcd53eb865e1be1d023283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb41240fe0e2671e5c0e87c7f4edc799
SHA1495c1e28a9a28538cf9942a686425bd301d660a6
SHA2564ad4cc2782baf474117c64d14297006d680e803ffbef7c8374015c5436e1bd43
SHA51253ea4b9b23f7fb5cbf2dd8ff70d8a54928a9dbfd1f80887cd6387ae9f69f09531ef81a482319046575addb30e22dcbdd288f154baa100521f3c0fa3696334d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552f7b004d0edff8658e679ce25057602
SHA1707961e542754b1e2223dacb6dd56bf8425f114e
SHA25620c97734f8febfd2a49e0d6bab3f59459d1bb9c76e91a907fceb64c8c756294e
SHA5129fcac7d6d64e05053bc1a2d477eadd51f16c70871cea94a31c579e02b2ef62fbb7bd93ef7bd5b4a04d453787192a200f2003f1e5812ef4326c7a5a09f9c87c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1649db3aad3ac6f74aa0aa6213177fb
SHA1a2d3d2a4e6e5ca147283ec5364e6c5b27a666790
SHA256cc71ea64eb8f47117e99a5b1c4af306b94a73b6f3045090fdde4dc15dbd143bb
SHA5123b101fffac609cf140355e1de62a900c89b035a4b54fcb21ae56dce90c2613d93b90a684bddcb77d575742c0ea21876c9b50108a87e5d94e4bf38d63504840c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5ec120027aa6367912f3027cb2e2a6c
SHA1c22652f41f12f66e4899cc8a23e69e1207b56e5d
SHA256512b497921fdd7db05deabf042e452978a273937f3e954ae309ca6394311ec37
SHA5121e3c338ca5c0ff8ddfadc4d5ae45cd9b0ca86e5769a8fe1fb2b50728d95deea77bba78c108c607d6c67bec5762228f6bf40c9e66cb0cc38495bc4b9a958d4c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55608b93b1496ea733ce3bc55aa0e196e
SHA11e9be7da07ef947e1ba682c95d83602fa2a68b04
SHA25623b54b7f1cbaa8754c5febc9204ae5542c100cbbbb7dcc3710b5817ec9021ad8
SHA512584b5054c1523a0244157a312e0938f5e085a2cb477475b8157577f7f8d7594323193571f217c051abbf341f6876c06364c0563acd289ca7321f340af27c9655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549860375fdac0aa49fed63f8ec5b4988
SHA1d84c12a8d4761125ebea6bc7b7e3c0a2b4f0c1ad
SHA2567e4ff777bce4756af2dae3dbfcb1b3b7f3c3478b578425adb912d3c3c2f85d11
SHA51226a59553e887279e1776ab1fd2c25b1a0f1033bc4ad55e0dc75cbe5ceab839f7a0cc66e72238202e06bd9af8cbe44eb282916c642ec8da2e187dc3567e30ca37
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06