Analysis
-
max time kernel
117s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 14:20
Static task
static1
Behavioral task
behavioral1
Sample
1b3b66378b2234a39d18452d9611bb0e.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1b3b66378b2234a39d18452d9611bb0e.html
Resource
win10v2004-20231215-en
General
-
Target
1b3b66378b2234a39d18452d9611bb0e.html
-
Size
3.5MB
-
MD5
1b3b66378b2234a39d18452d9611bb0e
-
SHA1
f80b5c931849dcc783fa201eaba18b89ee3c5ed5
-
SHA256
854d75d6b7f781a38fb1bfea9376a461c4c744d7cb1cba221f4323750ab235f0
-
SHA512
c5f74410a3d7702a897d2bab2df91dc4ccd2a1684c623b0a4da41b9f913df40e281fd6c24961559a420abeb3e03dc9bd212432a0549827ccb39565b9cbaa12e4
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NyL:jvpjte4tT6sL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410484653" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5E52181-AA8B-11EE-9CB1-72CCAFC2F3F6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f571a9983eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000ac19bec3c11ec8040d7a0aa6eafb8e231a4f2601f65a0db478de282d463a51de000000000e80000000020000200000007bb1b02161c1659ace5ada53e8aa4a525db014d21b0ee03bac9cd7f4b806d4592000000035dece965eaf2ea4349bda86223c17da1065183f2c24d9d2d689447d27fe179b40000000be53cca2854a3d983ba7fbfc7de1f745337d2ec8aec0d783cb69c06f658e22d5b23ed8263a1048b6a4b7369078105d12141dfecb4f287a0836569b33d9db06ba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000ef6c194eef602e725b9e41a3627196440b6f9847d6fbba7574339651ebd22adc000000000e80000000020000200000009b81e354f7a1c5a28fcabc1f83bdea38f8bf4caa44fb862b22c7a6b4bb305ab69000000043f23c86646917d53a4dc02e42632035b6a9c032123773997a1ef74e6b3c857eda7af304528f59a74911b14060fb47e6e3f06a1b415f993412b6f27a98f0e6331645835d677aa186460ba8f32faa436c2268424699bbd62092a895818aecf4e7fbff346a0af47342678ca30c0c2c194dfecf15389063cdf52af857007f3e66f28dca9bfed59be0f91034d8b950ce6a324000000090d5f334f87b27a36a8e6ebc782b08a7b4a9cd2e21f7b586d7a7c1a33d39767f5ca5a78ceed7df1aca9ccb41d6e65c4261df12c01733ab7c5904f556895a5650 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3052 2980 iexplore.exe 28 PID 2980 wrote to memory of 3052 2980 iexplore.exe 28 PID 2980 wrote to memory of 3052 2980 iexplore.exe 28 PID 2980 wrote to memory of 3052 2980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1b3b66378b2234a39d18452d9611bb0e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5762917e1d8beb7ee59144d6825bfd546
SHA176effff3e6ff10fd9ba0a10e572e1c98e933e1c8
SHA2568251e79aeff2e1fdcacbedf1e73910c374aa4f21f17cf6a86a4acdae8316850b
SHA51278c908c853dcaf3279bf54dcf2395556e3375d929df3bda8700873d67a7698ed321fc6a7bf4e9d4d1e920b77d851ed0e4971dd943ca1d808edc02cf0286c4365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a522966e3f785e0bcaa614dbda8c33e6
SHA1e5c1aeff3c33ee17b99abfce132f9fac7d87f7f0
SHA256a9d8f8b16d90bd6cdee2a34b92bc02144e7c5be1f5161cde3038bd1ccd7e65c2
SHA512aace73eaee19cfe1647850d0b4eddad9faa021dba81ab2510007091255648d2c2a1b9421d6a9e568ac3f89a3c61adbc549d9700682117c897fcd2c0bb86d0379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53c2a90138efea646cc0f9b51af1cd85c
SHA1d26cc996704d5310215f66d464c2a966a88e0085
SHA2566c5608e0835de26d8bf3739b7efe9f21fe92b34e5ed547e9374e16e32b4c33ed
SHA5129cc9f80d97117186e7486c35d5077b41cfb7c0538b590fc359e289b8b18240d8980ba61a2d1e6b0de624f279fa0a2d90f597319e9177d507dd9a46940c7ebea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f8301a9d2c4981bd7c206e1dbaa96da
SHA1669d5b8d967382b8323561eb9275d46d4f9129e7
SHA2561de6a7dd1363bd77ae41180352f922f870944003617046f1400b6a62cf36fd85
SHA512766129e36bf85651988abaf36d86f482f4f76f0e90b132db59da1efcc567566de6c0194aa568f73105356f76a1c550a52de78f685e4752d136c4e54a6024b128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d718d0584fddeb856b48a1297a95865
SHA11f5252912a31c057bdb1cf3a89a02bd43bb836b3
SHA25640ee5355dc420a79ca79323591e1394ac1e9f78de6102df0e62c5594bd6f0b9e
SHA5126df7f121293afe1985e94130d8c6d84b34d545e87cf4e42a9fa683ff962ead4644e5c143202dd5fa797213c38b0909d52add154e8774f922d1103945fa31c362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD597db82d59eeafc730627b2c4f56b866f
SHA1b80fabedbdc60fba55287b8199175de1ca903d89
SHA2567ca22558be4cf03bd9bea8f92f689f7ea8ce911f388ce47a493275e14757d6c9
SHA51288f9d2f4a387a45f6f5c96346fb3a2583849a623454b7a96b84c665740ebbfccdbe27c33f3bf3d029255c8eab8df1eeb33cc8c2a2c544175708f6db73b941b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53658e7e22dfbfc0c19d949f4845a79ab
SHA19d659b912390809610e4f4a5ba0121c13fb5861d
SHA2563102d77df247e1be00c9d464eae3fe7f33c74e97fd4e7cc5646c5f2018583b69
SHA512160788cf746487c6fbf325a47514a838bfbe1f89c790771d13916b5555172c2e308da6aafb35386538d8da2243b7a3c0b0a7dd828b72852038f06b0f52962f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54fe14d3df47d68af3250387aca5c8d03
SHA1cc44db5438c4845f74d080f7144d607358851bcc
SHA25626edafc0b127be27be3525b9f51474f6777493b2a3e7270270ac68647d917a9e
SHA5129ee1e5fd5cb46cf516a08ce83bcd8c019c8e544f57a705ad32eb87055078ca4a5fdc58b2a68103981c3e25e024471af13b808a9681154b57a488d0d17c0390cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD534ec17f2413d28891be7f859c4f9571d
SHA173f04b17ace375fb6c236dca0c9553bd8f31c310
SHA2569b04821e92c9d000cb4e5fb062e8c52cfb98d829b8568cfed921771bd862a900
SHA51234089e8c55da57bd02a3a73855a2bf685a57f6624874f8097834e9a3217ebdf59748ffa27b1f910062210f39ec9303901fd474f36b3f316f2d588fdec5ffbf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD599b4bc8893c7556d178470826fbac81a
SHA11d0fc1bda692d1945cc8a89fa7a6111b04759791
SHA25674edc6a91e5c467ba745645af84f6162700ab6b06601336d05f96394347e1f13
SHA5121da73ea9559ee8576734d1f4881aa519fb7fd2807af305d3c0c0e3c6e99d7367622e25e9b57ecc1ed1222bb06546d19e110e669629a2b0aeecf1353f193685ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54ba72bb2fa0fa86e79e772c5dc58e4c8
SHA1d6d343a75afcab535fb77d9637c9b2ae7d746eca
SHA256f2866dd2ef1aad81439370c253b3415b801eb84de7a1d5ea65b2165bc74737f4
SHA51289192f30895638c447cee2903b9f1fcc03713d76228a08f11ca1f4e53ff8c9c12d7b07f5792ad28672d31d8250644bb6abcfd659f4fdb46e043c35786ab93848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U0POR7GM\beacon.min[1].js
Filesize19KB
MD5dd1d068fdb5fe90b6c05a5b3940e088c
SHA10d96f9df8772633a9df4c81cf323a4ef8998ba59
SHA2566153d13804862b0fc1c016cf1129f34cb7c6185f2cf4bf1a3a862eecdab50101
SHA5127aea051a8c2195a2ea5ec3d6438f2a4a4052085b370cf4728b056edc58d1f7a70c3f1f85afe82959184869f707c2ac02a964b8d9166122e74ebc423e0a47fa30
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\V52IUMX3\jquery.min[1].js
Filesize83KB
MD52f6b11a7e914718e0290410e85366fe9
SHA169bb69e25ca7d5ef0935317584e6153f3fd9a88c
SHA25605b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
SHA5120d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VDAY1W0Z\jquery-3.1.1.min[1].js
Filesize84KB
MD5e071abda8fe61194711cfc2ab99fe104
SHA1f647a6d37dc4ca055ced3cf64bbc1f490070acba
SHA25685556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
SHA51253a2b560b20551672fbb0e6e72632d4fd1c7e2dd2ecf7337ebaaab179cb8be7c87e9d803ce7765706bc7fcbcf993c34587cd1237de5a279aea19911d69067b65
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06