Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 09:35
Static task
static1
Behavioral task
behavioral1
Sample
14a5b0399dc70500c166b5fbd1edeee8.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14a5b0399dc70500c166b5fbd1edeee8.html
Resource
win10v2004-20231215-en
General
-
Target
14a5b0399dc70500c166b5fbd1edeee8.html
-
Size
10KB
-
MD5
14a5b0399dc70500c166b5fbd1edeee8
-
SHA1
cc873fd0cd6a0e742d453e56c3a020e196e0ea02
-
SHA256
e2d8b062d24d7c4abe036fd17d1ad682d5e0eb9f75616ab1ef4e30b1d2d743dc
-
SHA512
39ae3802fd6b89f49d8cedb7e9a053e21e355f1bc10b6d55e3f0ed57ba6d102fc1c65e02b853cbb56f3a71822b610cdcb8b65231198cadc6141983d8219ca86f
-
SSDEEP
96:uzVs+ux7R3LLY1k9o84d12ef7CSTUHGT/kubp7C1qlVHcEZ7ru7f:csz7R3AYS/iy7C1qPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000076f1f9eb001675c0473bcba29c14a3587b2224d53c0a1107feacde8fddc1f4f0000000000e80000000020000200000005173fd2af7b09ea05b2a18c23880c2775a0d41dbf9088f4ea443a2d96b1df3d920000000c5cf52d44215608f4e8fcc3c04c440199851ad3568ce5054874d0f910ff3230c400000004ca8a7fb1fbd77371613010aafe558404ddf8d971d28dce9f35e840dd403db41dc91ba68e39872b4a53d6313b2783fb0000a2f41a569f1d3f63fc75712a6cef4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305d0caff83cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410306022" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D857D5C1-A8EB-11EE-B754-4A7F2EE8F0A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2044 2000 iexplore.exe 28 PID 2000 wrote to memory of 2044 2000 iexplore.exe 28 PID 2000 wrote to memory of 2044 2000 iexplore.exe 28 PID 2000 wrote to memory of 2044 2000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14a5b0399dc70500c166b5fbd1edeee8.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53133a8fa2c6b0b4afd047baadd02acea
SHA1ad81605e53ad0840b5adc4fc703e9587abf0a31f
SHA2566c0b6b59634f455519ab56f91a50e9ffc83a11594ff41c5c7d751905e744ca21
SHA512e520bf52aa510e99bf55db6d0a923b676d421d729049a97f2105bc7e72e90b59095d458f5603d25db8910427d28233da1e344347433f77627b63a666029915a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5486924bc08d6ec6816fb4efef01621b7
SHA17c99c6b111718dd36a65b77f4e805e20649a7aa2
SHA25624ca952714739ee880e665ed6c25b2a5dc12123dc5f51a290422c2beb997b15b
SHA51246414587e663a25295990578fb491f3a4e8b0a68257fcb1b1062b08db44025f300a6a41cf0cbdee90bf8fcdd727d1af14101c7f921a5aef0c3fa1a73e79b2282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5439b1ef9e39f8de32a7c62ffaa3f8b38
SHA1965e9b0e3de77003f6c2679149008f3f4026ff20
SHA256aaca729f6590f7df1b136b5a3ce6e65d972fc51d03c638fcfde49ca5121bc0dc
SHA5126a8fe8dc78d09374cf1d3034a7332bd91434a7029d27ad0762261440222c680a9b664bfd78e5a08c1cae295e8ee491591d2b7eec11941f5ca87942e7cee58fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51afdd869d5dcccabb694b9517ce40591
SHA16bf3bbc169f9aa9a5d99900d0d5eb419d87a9cc2
SHA25673f81db033df8d98a9da9080440ecf0386009c64abbcf2e7c8d5b6b81d20858d
SHA512ece2f169e5399661a63a91540d8f3ed480fddfe898b8e9b5ee2a7e1ea55ddcca9a72e193b5449c1781ebae382d393dd5c7f3da88ac8f20095b229d1acecac058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a8de83bbd88f4630a25bb2618fdaa2b
SHA19d9163d16940c3fca1d06423d021edc0b9babf8f
SHA256ca96d8af981abab37be6c5c5716a50b9992bfcb1a29fbef92fc0af2ec3cc8301
SHA512e3a3f630f870b0ed7220b352e44312b2a9171a4ed1cc31c9c497fc6854ba8f619b03ac7e6cceae2a4e60ed9ba2b59e1d3b74c946f4326ed3577dd4b51964c6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528291d19af3d35a43473a69828d87272
SHA17bbacd3ee28666467019df820e0c57b60c5bf7f7
SHA256bdf2e213762596e9cf6e1eb69d2d37b757127fcbf16a93f21d26ecbf2db4f5ee
SHA512266b75a4fa2fb1105cdb64a2a5b0af4a0c0dc6f7df6e4aebe477b229cc130733425bccc4711d26bb6308db6a36ab41236754563cd4b334f292676b52fd2a95be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546d2446509e0af06658730aae8f0625d
SHA18e8080e5ce6d20fe79b303765ce13e0f40b0f091
SHA2560138e125100b7ba01f87e153f6342b7a49a45d0566a57fd1db2f7bd524cf8299
SHA5125bac028b137e68904271349c127edfbefa9e3d40407fa82277448d4133cbc0114e54f3136be677bb3fa494fc51e19c826bb01a7c6995092dccb9e8d9781e50b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ec2c708a28fa81bda6a24e5bc167938
SHA15542e6aacd5539e2ba201041c15efaa963c2e46a
SHA256e59da410090b82a3b2bd9b02a7efd3bc8ed13a6e33785a3becf41a9c3fd20e61
SHA512bb13483890962bef99c1efd736be2631c5e13049908b40525759ad94199e980e2bc03d49348d0ed55136d0873a4145f570c2c4fb60c9a22c0801c0696a941fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9413a606ab7e9cd75de3b6fe1ca2d6b
SHA1e5e215ee43c6d7c656c931111265118bed3f3265
SHA2564056641d46598457ee87ff9b84f7334137d459c6e8c9b93913aa0feab233ece6
SHA512c78e1bd2c75b04c7c60e1b688ba2323ae7a275b506ea4eeb322eb10eb7ced3e2620e682a0c9afa8fac0d57415bfaf645d3327f1dd5a1304c62e21e7a0ec0880d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e2e2c6ee5dd95218544678c473e0e35
SHA160257769e870d09431373f3f3fbd2092120fa0ba
SHA256560e6a884210435972467827a5fd266d0ba41391b5cce2121c218ef9e1e3d8a8
SHA51270fc5642031ba070f4633b2ce9de04425c857cb1cdae31cc122a836c3347e3891c60234caeeee2f804add34c96cc0b5250a9e7628b34d0ae585bf3805be2273a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5061d89adfd9d962906932a313efd6401
SHA1a229f69659dcd833a0e4c0b0cb6a7c17403b7be0
SHA256a9b47c8d688da052089a618323c8d1304a9508d870db956c084f10f5da613e1f
SHA51247af8db8dde78317372c20620889d84a79fbb1526088902482c61a64f00399d9a2cb9278a65347d4dfe8006cc1d33cce65797319d0d277e2b5c2054caa4c234b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f67a27e319e922f184ef3c43fd4dcdb6
SHA1083d04f9f309832a3602edb5599e6c0046d0e116
SHA256e5d144aaa87f4af580c71398a2bfcdff6b1eec9901bba63365e7c3b17bf7ec40
SHA512843f60ffd13a261642b51271ef867affe7947224e6d0ec84784340d0e36ba233d93e691d43a653f420423304e6baea3b5d774569d6527f4604ddd920cb43be2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0fb5b65adb8b61ca7b697cd196bef0e
SHA1a9d10fcb240d6f677758f88de4c624dabd70085a
SHA256ad46283a482b503a840ed9c5457c6deb3a21443b4dced9a2ae0b2f8681847831
SHA512d5705313800c50f3cca7e142e89f40d385270163cc9c05fdd59a622eb63c65687b3d3ea48747ac7821c937b12400a9046404518ae3bcc253aaafb77bb96d36b5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06