Analysis
-
max time kernel
118s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 12:05
Static task
static1
Behavioral task
behavioral1
Sample
17fa9ba2467fe60464e05ec99a1a6c79.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17fa9ba2467fe60464e05ec99a1a6c79.html
Resource
win10v2004-20231215-en
General
-
Target
17fa9ba2467fe60464e05ec99a1a6c79.html
-
Size
5KB
-
MD5
17fa9ba2467fe60464e05ec99a1a6c79
-
SHA1
72a6ad830d3e73997b9974fb338f6d339e9d237f
-
SHA256
a46597e7bbfed0ad371f93c0c9caf279482bfdfbe5b9b61253da0bae309c7593
-
SHA512
6aea2f3c59a3c759d758f4e5763bff06c55cc83eaaa345a8fc244562e18c144fc9a0c88acb4082a24ec5d6fcc343d1419a57c1820bef03b2f196f9fb0c976e8f
-
SSDEEP
96:10VLzgsB7c4/FEHgmW3mRqvQHHs54d0td/3dElySLsQysQlEY504exTdgpvuT7Mb:sc6r9mSmmWApQbQlJjuTihUUOYLn5h
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000003cdecf38a1bd8ff349c65d5938eb2a3a7198bc4d0d513373218ad346fe77566b000000000e80000000020000200000000ddb7059fdd4f20d0e726d089ce88971debda5cb2fb7674ce35a22af6ec2d29f20000000b4443f03bc2f45338a95477856432f33c995537d12f5010609ab694f6d91a9dd400000001de8ec69aba0d41f1eea88b6444b7397a7f9e2e27b2c28cdc4dc4f85ba13600fd647b21388a8d46f28fbb5e2a55dab6c71a4455d926ac2bbf87a208a00ba4e4b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410214301" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{473F55C1-A816-11EE-9F2E-4A7F2EE8F0A9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e46d22233cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2848 1644 iexplore.exe 15 PID 1644 wrote to memory of 2848 1644 iexplore.exe 15 PID 1644 wrote to memory of 2848 1644 iexplore.exe 15 PID 1644 wrote to memory of 2848 1644 iexplore.exe 15
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17fa9ba2467fe60464e05ec99a1a6c79.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1e58fec1394d6d4029290ba6f8ade2b
SHA1cf24a15d47f33fb3cbd2615b0fcbdf10becd2cd9
SHA2566021d611ddea4f3ff50d35c147787c28f23fbcefebe0ffda8c585e4fef281c54
SHA512a375d9c3b66e9e45cd15ff528edf3c407451c5ce4c1839c5ef9085f4ff5af770e90f6d43963a6fb1422968766c0af2cfc28dbf173c532e67372ccf34b2c02763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4e63488e6ac1bd9edb7ec0ae42efd81
SHA181a584a971826ad797ab56e4e77e364ce699a9ec
SHA256f321b915f82bc888083a3a2df70e0ce370aeed6fcda6c0b838d2c75e46213594
SHA5129de888d8ca8bfcb998fb4738b300c49608154f23fdef33b0c46cf8debe85a865038a052e91a4dd9574e691401515520414879d0e192155e573b1b425a7a7b404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5902e1cb06947cb2063bd554de3d44cb0
SHA116ba8d75821ca85e236a7295fb5fabb1d58fc770
SHA2561f742db7d868fc0bd4f70d3777749eecfa677ca5ce12e6a031044f4b22a66814
SHA512e0d0cb6f9859286019fe937761d676502da23544e8dffc019cae22e1f8b22ed1589cc0db350304e42cb64d5ba405557fe37a96b4491abc91a62ec8979f9da204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502d8aea5d874280a160835dfbe1596e7
SHA11e32cc2a5df05546c72a709a4a23f0c229172da4
SHA2561beaff14fbc93b5c549f68ad19995bcbc18b9906ea893661e7f1e92089648a88
SHA51288b998b6f6b423f946d87f6352889590fd7d3d8d315db9185add558010f4f7ed32e6c2f4a61b82cf6cfcf1635d4cadf1db3727d2938d31d70be7eca2d0632f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d32d750248f58f7d702f637298f1b4d3
SHA1ef3c01ef230da04659f10773f3fce6c6052403bd
SHA256b4ba2a6e2f46d4bc6d14f582446bc96b5d3888a0d9ae7fb1d326fb7164ad3325
SHA512c4918ef7d35dabbfc58a317dd36a5ceea95ffdb153e0692230f85cf90035a5408d27f40508357ce59dfd07349a299f87e0f0ac01f42b04901acae656984060b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59423c1fb37f54ff1bf7cb10a14d426e3
SHA14b6bb3657658d75ac0ef70ef34cca66e16db894f
SHA256a365c0f90b02e81b2138bb426e46a2dd5cfb3aec5b12f0f9a8d100d435563f10
SHA512bba085fc6992a5dcef5d9013ef6b576d3d23cdd93986caec4bf4f5863e7ab3c368f619f691f68034a2e20c6235bf8596f2b05061f782d3541fd4bc51b9ee2e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58af8f8ce723025e5dec5180557bbaa0f
SHA1e68ba05d30a3c371faf2da3bd00a253ceee21420
SHA256962c2cf3589204d6bab0e046e37259193cb4a38dab23c0dafb80250c9d3fef12
SHA512d505c327ec708dcab16f2cf874706e420e31067a53c95cff76852b75432c8d271fd59cbebfa36ba82c6ca4d3429fcbb991bd407ca8fb69f251ba7da57b0b9bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539ccb6d0ab50ae721876852e839ba3f2
SHA1108f95b8d2b4111711c64d734200093bdda3d32c
SHA2560e435d5ac6c248aa00eb301e5b105dbb784afbdb118e922d89f988ee415ad620
SHA5127310c95598e80089851bf713e420a0fd229f68c49e302b75d102eb070f7a164c42665590a2dc093b40d0685a6c0a600e79853d5508300fb8fdcd622b3e8fbbdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517a01e6197aec10c1d4b201a95d2f20d
SHA1385a3eee55c37604204ed8779e7306faa72d990f
SHA25608f87af3da41d428ddb0c4d3cc2cde216809eb6ca08fa4159a0b446b9ab66fad
SHA5123547d13be5f7f6201a0f2de7c57433ea26492c67ba076413ae95cb34c1f23bc6ca394e61f2cdfc326d3403309346be62b959bf232d40a24c7eb67d1306b4895e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c118361ffd6891104a86d5271415b31f
SHA18f0c81920cd7b6e5dc85b061d3fb30c57c1b83b7
SHA256e085ca2df9f7c1924a1c2a07d346362794765d8f7214c1ed2641fd7e2711aaf8
SHA5123e56f49887823665b4e0bf36b072a8865b0e1c304885288b8b783474f53cec5cdc97ef2ff43e057d3c5a3250ef44d1c4fd0f8fa92d98f8833596e8e54ef1358a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d8d7de06addd3199a7457ac6a5bedc7
SHA1eeb82ab8fc433ab1c18edf5131392f72af497ad5
SHA256b6574405c97db127f18db974d3ddb97ebadc84ff08a67336036cb9f4b1dfff41
SHA5122bc45679194f4b371bae08da10bf6df55424276d536147807d2ef87d562c51978ea5958d554ede401e2e43310747b4ab1a0dd3f3fafaecc2c602ed838cfa8666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f48cfe5f0f93c10789f8d4c775d4d57f
SHA1e3b9e679e9205e2d0a052f6a27c8ea9e44aee7ba
SHA256d1cb04d84ab470c4a6783908e567751e8a86a3cad3fc46448eeb46a14713c4fe
SHA51296a34e57967035602695dc6bf118c4869c8a9330b240578f07304995dab082efe3861d27adff318d6c42c390387f2b0729cd67baf4adabcd19cc76909ba0f971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3d85bfdd6312bab5c6c8739cecaab0a
SHA11bf0b525e5e6f230798fe17fb179c23eae12ffaf
SHA256aade80b80d760156757b629bbf2aa48cb0c03d609ca5163c456b93ae96389571
SHA5121ff83080bf07cf455ccd0682334611505be9d50598e82a45b2d94a247cb8ae0d393d346a49bf5aee257cdfbcb689e8fae2ac9c3c204e66b4d65fc271e3e9ec11
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06