Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 10:33
Static task
static1
Behavioral task
behavioral1
Sample
160a7d5eaa22ed1969b81d96a52901b6.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
160a7d5eaa22ed1969b81d96a52901b6.html
Resource
win10v2004-20231215-en
General
-
Target
160a7d5eaa22ed1969b81d96a52901b6.html
-
Size
38KB
-
MD5
160a7d5eaa22ed1969b81d96a52901b6
-
SHA1
e6c435583906a2cdaafe8fb5f6da21633147ae3e
-
SHA256
8209509923272a230ff743c19feaa7a1fa82264fa03f18e13c0d8ef1e703dfd6
-
SHA512
0deb9e13674aa02bee25f3051f8714843a8c77378ebc440f491ff0b041b752d448c608768a70729c841dae7b1d144172947ef16d3f7e6868504137d5faac1963
-
SSDEEP
384:1EUbN09p96uOJF7ClH7K0i5CiRTiUaS3tjWsWd7iOQxXvmmorS49Nwx:1EU09pAJ5VR2UpdHOQxXvm7rSJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10805101ec3bda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410190615" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{290ACF81-A7DF-11EE-9D16-6A1079A24C90} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000dfb528e050c4a664c8209d4f81c4ea90f259d246c504c850d543a424b02287d2000000000e800000000200002000000003e83868afd4818ab921a2ad1d47c024d1631e6c8204a353278752352bb4b4e820000000916edae13985a0e1009f1d59e4eca4d96991d4081ea417a9fd8191d4df9d268340000000086eac9632cdc2e3a3c61677dc574fe9d45932b80e712e3b2936fcaa95abdb3e87d89090c5332085375a321be8e83e7348c3f1d5c7c12e92aba8596d409787d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2144 iexplore.exe 2144 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2148 2144 iexplore.exe 28 PID 2144 wrote to memory of 2148 2144 iexplore.exe 28 PID 2144 wrote to memory of 2148 2144 iexplore.exe 28 PID 2144 wrote to memory of 2148 2144 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\160a7d5eaa22ed1969b81d96a52901b6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51da241484bf1b1a85b5ad6f4a245dd7f
SHA1403665a0d0745d7185010d930d2304bad2f13a0f
SHA256d65033868bc6d77e9e2dbcf04e23cab8b83d18e3a2d0e5eebdbd20070570f55c
SHA5123dbe2b5d3f276f6661cf79190a8c0895faefa24a47a6e3684d1fe1ab2dd0ec4b06fa09172c472500583f73de8a33a8c27fdc51c55e25faf7b83bdeca1d5a307d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d399ea355726fc88391c834b76b87a2
SHA14fba7e41ed558d39b747aa9d16fa18e4acb4cdb3
SHA256f382de7d815ad235143976d0162ffc943bb1401a092eb4cc69dce9abe10ee688
SHA5121ce8d642971880d74558ea9de8f9e522567391bf439b0c93451547dfeab50a4b29736e80e68378bdc8c5ccb1ea0be7820799a1791c4d978985011cb763135f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af8469d9f414b8a9f2bc111a699a9ad
SHA1fdc220fab26483324677cf7188db19d2dbf9aa7c
SHA25643c07df8a7b30493137413494a10cd76fb9229e7eef10ced51d3ebaf8e8ac3de
SHA5126ed278cec923618d4c764e0c97497f8f436aedb65593238f576f138a803692c9f8e0ec927efee5cccb46858b94d5ba51250b650eae1000bdaf4eb221a6d72006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc0b02da20ce7bfcafefdaf1728ea700
SHA1365254285281a1051894a4932ce5706f169521c8
SHA256b6792655e01ec66643e8ab4f5caf466d3d97694cc7424bcd3e88521ada1c078a
SHA51273e0b543724a9c4dc9edbb8ff187d0cc3bdfb5a72d5916a40ea5e9faf62f86288a5faeace6516442ff315c6ccc7c520844539e383dd2c734c907096ef018828c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb6335f3f90a16bd52435ca0c3ee2593
SHA1e6915a9deacc56fb85e944d2751d083dc255f320
SHA256be7165fd7dda94f49832672248772cd737b1ab4ee362aa14570aa05ddd2d9259
SHA5127658bc2306cc19742ccdec4531a0582fc44bb75a1a5ec75eefc56e3922b8a6f7951e2719ac014f06384725deff71b9bead32b4b47d7c748fdf8a76bbb8fd94aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5674ae85064542a02e8c9f08902844eec
SHA103ee3ea45c7d9f5e11d56623f930a4584c0b4a1a
SHA256507231c5e9092542ca63b8745371c83490faad5a8bde02ca4745296e8828110e
SHA512604b56931773a3d83136dea5c56c81c45a2bda66c50fecd079e9291b7daa2b58706938db83848618e1f46d1417262477920fa462c1c94f12d1c79a3319905014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad71aa8518b3cff2c672faa172a49208
SHA1c3998bfba61e694fa7748b6768da0103b0ca0265
SHA2562946b91c616d25b4ad3744f4c373817ae96006334c5fa87608baf239ea45a567
SHA5123f858cfe5fdb876edafe0216063164b884c77d3fcf491c7051b20531a4ff09895c38006b6779928366c1d64482405c27a2ddb114d07aedab5075df64243b15ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536b5a58dc18b16e5f9807b2343e3dd97
SHA191565eb939fa6d67278890ff01dbfe6166e38cbb
SHA2567104b4f791aa0109beb690d7b0d4f80224bda20687b46f1bbbae2c64fe8fe8a6
SHA512656482c9b4e391d82b167eea371a8864e9e6e3c31bae3dc75347a6f8d3c31e2f9b6d65f5efb981e6525d50a8fe1f5c3deedba3ef62f812f7aac7eb1d79a1f62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54478bd1a233093f37535c303362d5bb3
SHA1471aec0124be24c2078692011052946dba600cc2
SHA256769830413739d60431a9f39418a05acebfc47c866af0a99295894a08ffcc1983
SHA512cdfe04f626b460174299800cd397cfe6f0010e5706d5f5cf4f5a82f9c20b73390918fdfdac515e88ce48dcd1b90c22d0477f27353352b6265997fd80771157fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf59ebaefb31812e5c9596b5da774ee2
SHA160415a8432f91bcd900a568e03f7b3d8cbba4eff
SHA256003ad36e19e0c8074f291f1a6d1f9a1554d777d2996fe902e2babb4672ed4954
SHA5129eac1ec102a30acf37ffee0b6f065f4f5e83f820be9e3a98d84e8f7437f2bcc377d5ad01f57c2f6482c1ff4e275f523c6b0ceaa8e4ce5c0f975b8e17cbd9c190
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06