Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
13fc2987f8339fda05e84bb1258699f2.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13fc2987f8339fda05e84bb1258699f2.html
Resource
win10v2004-20231222-en
General
-
Target
13fc2987f8339fda05e84bb1258699f2.html
-
Size
82KB
-
MD5
13fc2987f8339fda05e84bb1258699f2
-
SHA1
3f7357e584560169d54c725bebac8d48b1af659f
-
SHA256
5eb17a706d0c21c1c900b513f6725a84bfba754ee53c5328a1c66541fb48a22c
-
SHA512
63a62dc192eb87f45e2ee6b8d942233b4c55539577993647315b56faaea4a1ecf1cb19aca6e37bdbec49a5cc32f3831dc68f3891b567b7322acb8a2cb7d6c230
-
SSDEEP
1536:Ex3McrpkfDh1aaJ6rHffu9owAKp4TZt5ybgtXfJWEljMTldm7O7qx:+pSmaJ6rHffu9ojKSFtgbgtnjKldm7Om
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{695564C1-A8BF-11EE-B1E2-4A7F2EE8F0A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000c955ed9d9f19eb4f80d19aa5b1383d02256d012f29bd791201e7e597060450e2000000000e80000000020000200000005ea8522f56eacde4f87831e6c4808dc6f4830011e05fe43e9e3b39d60053e103200000001a3884c249b23badd36af4220967d7f48b04f7f1b4eef5dae15c73d7f2b3e42a4000000033430db52004d2102cc4c7d4082a3779acca9e9c46cc592ae8500e4b395a3beb98896bd30e71e035689e8cf154c7e1fcd3c870009c2479cd0a01d42502909bcc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08d934acc3cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410286925" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2396 1728 iexplore.exe 28 PID 1728 wrote to memory of 2396 1728 iexplore.exe 28 PID 1728 wrote to memory of 2396 1728 iexplore.exe 28 PID 1728 wrote to memory of 2396 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13fc2987f8339fda05e84bb1258699f2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5034ec3b760b9b922d37ec2d86820ebfa
SHA170ace12a56aa61e58f53ca2a3de71ff18966278d
SHA256015e7444eb0fdf2cae85aef5c1d3d1aee98ed7e692c848ea45bfec3a35ccd821
SHA5121257126cb3ffbe026affeb47918d546df4fd018b1ef53971bfa8ab53c67106d7dbbed03695340c8b5a446fec87ecd100f264966d934a0982586bc45a7c38188a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5b302400208bfd019effa81b425be9f5a
SHA10259528ba66cd5267afe89597d2f65db772f78e5
SHA256088c8562553070dba313ff0362ad52733bb7b0dc44569397354f8e0ffd7b40f4
SHA512ac2f6d5f7ca916c9c6eddc3da3010ceeeae1d14d54f037078f9b157040b2f05262c004e3745ccadf16456080fd0699973d398078f91cea3d7f9a5116568994d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ea08287fb2d010878f271701d9838a7
SHA10d40a51cf9d252139f28f6ab86fec840006af52a
SHA256ecd67401a2d54ff0d426fd220565e1a24dca5c4311eaa0f0100df36debcee532
SHA512dc2e7675e25ada377b8bf06abebb4cbba714702bc8a1f4820a6135b7b2c5a9092ae5db071828c4433de7d5e969e76be16d272369573c6ce878f255b224f72ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c394c8937b9eaa4924d4139ee447d8ee
SHA14a27e04163f0237910bef7092d08f06458b398c5
SHA256a26bc34e0e97c0488e915da643b27cb59be6d1fa0f114cb7cae00360753eed6b
SHA5125baf21cb7fd08d68e97103961bb11d7e43fed53f61d91c1e5e92242fc76c836980d079d7ce78f7645dcb38d1eacf9f8b5e27cc9a3d7103e7e454a2cdd0ff6d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3eecf53c730c01058314d2efd0f2aed
SHA1e07baa60fa75991bffc7e15bad484914913bb379
SHA25688aaa68f059535400bd036bbae6556c2cbcfb9e6d6e5db00cec6ab67e42c3af5
SHA5125ffa3a882cb6636ce99d11d9504b1fe4b468ac6c46f47a557d455ebbd8acc6b83bc33917e0ce3d51c4d1e9fa8f5411f0a0fa10327a09129ee2be088d21a8ee4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb41e9949a4934065f87eeb81f18b8d8
SHA18ce2cbdc1e30c1f35c30f9831366029457bb869c
SHA256f0d5841846072d3f289942ee5f488247fe94271a97dde67ed103d1e27eb47cfb
SHA5125605497f88c91ad97d186153e87cd1d9fe6c8831e0333b0287d10c1945d5df64281977acf3f0f1bc3507a33500e4095e5c77ef34903adadd0feb12a6039a7ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a3ba478cdbd12b83f2f7ffd55d7c2db
SHA1b3e935a9eb1220bdef520006749006c7898d6938
SHA2560e384d6abe39a1830951ee5bc4d8b450ba70092af101e7cc47de46dc40c82599
SHA512598f1b3b805a92c39553013f2b794d037fbd76827db43a543949cde97cea84a11214783e33aa9e44e086158c73b2d746bc8ead2e522c99b87047cb2286a728e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ad8acc36f2eb571f202b6e67bf6feb0
SHA147666d25f734df47723c43a3b11e7c4e64efcf41
SHA2563d5e2c178f3b6d3ad2b19cd3fc2a21cf97e52f9c4067d545b1d414b340fd1fe1
SHA5129addb0748964c818f557006f014f15275e4541471bd7fa5598f4ad1407813a5b46169a3fed39deea33e2423b3a4a956a1d453db71bd725cec9a1984c10ff6e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5407491759c0df0e90f62c1d4ac3ed8e5
SHA120f7f1a90c4eda7a8abd7db029cd23ef45a05415
SHA256888dd8df9b8731676b33a38da1d492eb5c4cf40d82229cef3a46ca259708b52e
SHA5124471c0450236818d8eaef161c8b4c185e330adeaff243d4db3c1496e09b2b69ffdaaed6cb9d79d74655aefaf13b851e7d36af3617bf5a9240240810aa44753c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df6ad3ab397b4be909bf24843766d22a
SHA1ed54ff2c371077dcb3257c5b457b4775d9ba834f
SHA256318f993ac8d18f0a6b41dc70d3a31210211760fcce30d710f625e1bc73d50e21
SHA5128c90e6965ec11b40a1bab08804ae87441ed724d91745684b26e03a9a0755f3a2057bf465291e812324c47961e6cb7ca9de840d95c43182af7f6ee6776b2a720c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a87d8cf60d1d4c9ca01b589e0537413
SHA1b3ccecd2304846f57591e182b94c051ed2945afc
SHA256623cb7e995cd27ce19550753026e753603d4472ba4d75bf68c0567c46762f224
SHA5122fd9bb3ec02111b56678b905b590a0c8ff9b46efd0d55868aa9bd3933ee6c5c563a48db981db79c803d8157d4a8f1571a85be0d7454dc0d3ceb3f4a46cbc1c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8c13e98316f02f3972ff6b88a6e5bc2
SHA1107cc43acf2e485edae94a1ef540d78dedde38e6
SHA2562d993c397aa0347a28b704154514641eb6ecee2aa1cb887ca8e79efcd7828a99
SHA5125559f2fefc0efc5d8680c965ed5ddb122f325ebaddd7d11e68e4844bc242f00c66ff40aa37dc10fb51d37524424157525ddd1e2e53df08eab91140dd1570ec5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59886667b3cdaef413084ee43a594c9d0
SHA145fec33daf228056765b81e827ee1a0d1ff86d30
SHA25622ebf37f14e39e309eed5113b3ee68843566ebb789d62e226036f75663339338
SHA5122b74d9209ddd3d9eca23fb3744ab50f9b5e35e1bd900066b82d6e58fe66ad20041afc858126c1ad069e153732c572e335d2cd7a13c9a47448fcf6b329f657f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f9cf7b9daf2230c6d9eda0fe9292ee4
SHA1bbad836888138aae51cd489182b0fe737117b3e7
SHA256b26a8553eda51321be95d3aa74023e6a510f4e9f3ecd1e2e2a13cceedf07d6f0
SHA5129de1be90f3cc398c63921b0344738fbc9111a26b0adade7e7dd4abb1ce97b8cb294613efd1d711781a880ed7743a4adec1527fc3885754358f2cfce0b62b4651
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06