Analysis
-
max time kernel
134s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
13943ea0a2a837c2787daf20e2dd7fe7.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13943ea0a2a837c2787daf20e2dd7fe7.html
Resource
win10v2004-20231215-en
General
-
Target
13943ea0a2a837c2787daf20e2dd7fe7.html
-
Size
101KB
-
MD5
13943ea0a2a837c2787daf20e2dd7fe7
-
SHA1
5b08f81fac3f43f49ed23b01bd991e6587207e26
-
SHA256
e1ef069407dd9fad2b5f39596c57b8d1ebeb5e655b3f78d452cc4f6fccef0e2d
-
SHA512
3b5fadf799428e231be523801b97ffc2ccae6a63c13e74c5f2aebd5843354dee7d3a9cb7bca7da140d2d97550fd6958d379905dcc9053f6643b411cf6a90e0e4
-
SSDEEP
3072:GaLAWS4S57cMgKB6HeCHNWdSzuYXrN6YJlv5YmIJHa56myQHSj55Ay:HAWSBS5hyQHSj55Ay
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410278343" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6708D491-A8AB-11EE-BC40-6E3D54FB2439} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1180 iexplore.exe 1180 iexplore.exe 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1180 wrote to memory of 1748 1180 iexplore.exe 28 PID 1180 wrote to memory of 1748 1180 iexplore.exe 28 PID 1180 wrote to memory of 1748 1180 iexplore.exe 28 PID 1180 wrote to memory of 1748 1180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13943ea0a2a837c2787daf20e2dd7fe7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56515f742e510bc40fd9ea06bc8e1cbf2
SHA1c72be40ca6fba49d61011eee6c0508af86d7506c
SHA256e592d873b838df35b92bd826cd70bc196ba337c113498419860ae589ad21a0fc
SHA5122a0aa69fbdd06e2f10dda4a8d03bb3c7c3f6a777d8442e8fc144d87ba4069e2ac03ec43ca811553f5ccf738c451b14df2eab72611791837b87f92099f79daa9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ee228d4810b6a3b36fd75276a2b9552
SHA156245eaf4e6be9a11fc9719e7afed9462221a09e
SHA256c0b1e11810267b8d1b471fc07746d4c0684eefe9e3b945aa721ba0c5397ff2f3
SHA512f8caac6fc75095a18a67a075881129bcb859c964bc155eb3c2960b7b34f116bf1c3aceb715733017334b9e70c8485263826517470a3b42c20ff3f296f8e15e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9cd559322c82c24221d4615cd1905ac
SHA15bfb6a014bce17595304469dd6d9b472ff56da70
SHA256b9fb330d173d326241c3afa125e6ce6ac2d0480b3d473ead7baddec801a7c9b1
SHA5125fee027766e8ac34347bf7a37d3fb8c0d27f101e8029dade7b7e5c3d8a9387a849a42eb1306c30ff060c1419df5fec228bdaa2c871c950dcb6473ebb9c708c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc48445356e8598d5d1b25e939989fc3
SHA17d669e7227a35e0329867947764a344f2cea0537
SHA256238cd17ab61df0f726a896439f21537fe360b3a31db81dca61411a5be0c739e1
SHA512e3cdcb7fb72bf96eff5d1d563746e5024c6c05e63faffdfaf739036b1f9108fd7450d7d88b5c0271f968528b500c2b6d4a538900c6426c1f048fb08715e7181c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522f00e32e82558bc245d8c5f16c53fe8
SHA1c3edf50ecd10546f170345d89c5abc1317b95c03
SHA2565af53678dd1cb772dd6d12c573e5c8461a8b37c47e95253de40e12b40d0a00d5
SHA5123c1f632f5a21dee1572ee46b697a1baf75865ed4012cb6634e1de37ba1bcdba153cf9a2d4ab897bc29294c9132f9369da3abed6b93f9b707f182cd12762931a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578ad820ea12e9c309a357a1b7f233160
SHA1cd75c3fa154e3a755a2599368c695807bf3655d6
SHA256dee03830ace05c0ed376df6c1d0f66bf03c58ac61afee2ca11c663fef1266538
SHA512c73674f4a6a687e1d0a61e32f30660487aab8d40c56deedd3048523167dabd8d4a82e7115e58229f7aca996db128f9f8e88e1df54b22971fdfb3bc7a1f57d5bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511ca673486bfa1dc328911e39a30de33
SHA1e94ab60397c478974d14859f0bfd21277fa73c9d
SHA2569a44185f181c2c2562e3832dde04c099f0bfbf5e23b55a38925f2d4dd8d866ca
SHA5124c7bbf225207aa18c04685de85241b89572dc08fb538749990f2c756a25612e3eb13146b704f2c6ffaeb04affa6df72adf43ba24cc6ae658d9bc271046c3a880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f68c1c1137cd368b4288ba4a9089cdb3
SHA1544f475e52f60f09293a1b2f9e75a0a5f3b79e5f
SHA256c46dba4c8564bf5fe9b9fea459307166a5c5e84804f38c270ef48b68c896962a
SHA512f492c890e5556199d5b5776a8c716b9a5a867a1f30aa91bbdb9b5a10c236f64403a3cf2d7d78ca19943e5197d9ed514c586e975bc8ff523ffb36a93c22afa9fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5241e4275e0ec33ad53d3a766e380d497
SHA10a9cd74d0c081c1feefcf7d32345441d593e59ff
SHA2561877212e9557ac226c13e69a961d51fb25b739347a613a54f28199826aefae15
SHA51248072518820508cbfd324f0ce35420b835b479d1bfe877f12f87c513b617f7d861de3035c859a681643ccc1adfe4624e8a304ae0061636514be3a8aba49fe708
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06