Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 10:20
Static task
static1
Behavioral task
behavioral1
Sample
15b4405850f247fd2599d2a14664ca0a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15b4405850f247fd2599d2a14664ca0a.html
Resource
win10v2004-20231215-en
General
-
Target
15b4405850f247fd2599d2a14664ca0a.html
-
Size
139KB
-
MD5
15b4405850f247fd2599d2a14664ca0a
-
SHA1
92d0f9d87bf71d7e4a2375a3d8752611c2563c07
-
SHA256
7f2d9f2e9a47e17635b176aa8459f947c1198814440695d63ed54b9a204d314a
-
SHA512
792c1960606c60b9bfcf70a9885f6e94703ecf18cc58f810db2304b0e948cceb01b45accdbc3bdd78cb7352c77a4043a23f89ab43ade6c52bedd296c920517dc
-
SSDEEP
1536:8BxKMP+HHk/x9Ev/dSGvxrd8AdIcD33pu4DfKdSCV26ARURSTkMVXT6Gje8MEe4K:8aHox9EvUlMMi/wNqiBH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410323930" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F4E6131-A915-11EE-B0BF-4A7F2EE8F0A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2908 iexplore.exe 2908 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2732 2908 iexplore.exe 28 PID 2908 wrote to memory of 2732 2908 iexplore.exe 28 PID 2908 wrote to memory of 2732 2908 iexplore.exe 28 PID 2908 wrote to memory of 2732 2908 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15b4405850f247fd2599d2a14664ca0a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57939e4643b5d067a9e60ef78d2e1dd93
SHA16a104f4e6f44b88c516bdd63a61d645c817e2f4e
SHA25679e0a2ccaa2df34b664b8d5b60c69d7097f9d4160616a707651a91718ae7ee90
SHA512a19f9e440f3f81841db854fbb47377e43f148f026847f6fde4d81198c06f7100ef75bd7588005f455b8725759540cd37ff1c166307dd7fe671db7cfb46ece39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e8d0c3043df50501f7271328d15737c
SHA1e698b0ba35877e7a6d20dd44399815e896c012aa
SHA2560723c818293609a0ad915b7a4a1bcc146bed322d8993958f56cba45a9be05b98
SHA5120caa7eb148a80fa7de7c1bd3d07cf71d7af2a817473da7c59ac92f76f59b616cfde7c5240861c05246a8a3f5d736bdc86338c7d77f69f8eea85035757fdd6897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9a2e15268fa0f32b072e564b8005f0d
SHA184c135277d7befaef77c97499447617e5b30a7f7
SHA2564a55f2429fa2ade7fc757481a7c2402a9fcbd814e52c5734ca3858fd201cfd9e
SHA512ec67bcf5a1f435b12ca66c3739895b1e4063f7360bf740fd0ceb13ef35b62597b782a0a139d7011f56579ce8410baf056125bf9b62cfbcf538299ca16b2979a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daa474aab17e23a7896b94ceadedf258
SHA108951b99e1878dcb68f61a73116fedc714aefcab
SHA256d3680f06c6256396e24f9af8dc06ceffbdca5719ec942a50df8ba1b259633037
SHA512f39f8fcc8656d3c68d1cb4ef576d479f1fc6663b701cf35f70eff92e598c4e3611715973a4ee9a94e25b1236992a20089a5226c493ed29b7e9cfa7c2c8a54fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1c6edd99bfeab3e54af268a97634af9
SHA114710d199282cc2ffc9b87c254dca1755f546837
SHA256fd92bcd36448d0c74133100945df2ba31ce37dfa531320e9c0c42467654991ab
SHA5123eb2453180db0ff41ae66ad97dbe76cf13d020dd08e35dc6cc2537f3447ae5b46c40fcd21e6017090a79cd2ecaf414fe7bae6ea86a0caa50dda59e699d59b910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57406561762ef97e9933c8291b1b6d779
SHA15650fbbd058f7e524eff0e31bf3c48a816531742
SHA256ebce618023b7ee4a8d15a09e0a0e552dfed2cbb37ef9929e7403d81a34c21a79
SHA512351836210f918c82142582fcc66404e013baab829fbc32450a5d792eb366e6c8e42f6ff8d5fc7ec78cc3287d98f38e9004bd0d1764437ea2c8653ffbd56617ee
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06