Analysis
-
max time kernel
120s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
3b4d615a11daa7de4ce6d19b30b86beb.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b4d615a11daa7de4ce6d19b30b86beb.html
Resource
win10v2004-20231215-en
General
-
Target
3b4d615a11daa7de4ce6d19b30b86beb.html
-
Size
3.5MB
-
MD5
3b4d615a11daa7de4ce6d19b30b86beb
-
SHA1
8b5eb4da8c83cec4d0ff7148a0ed68686def1d17
-
SHA256
bc2af8bb328cc522dac0388eb0370ca776aead81e0445a0871ac920bdf507f62
-
SHA512
54a2fa3e175536f2bbf628b1a23cf98c73fe588315ee85bd8ce8ece1c9c75a425a528f4ca910e7ec2bdd243bea600dfad47e6f00694cca48ef6a7ccc90751019
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NN2:jvpjte4tT6D2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 200ed28d3c40da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000942467b39aa3a70f9a3f8105937c199f775b2c4436b77e783fdb54a56f02cb5f000000000e8000000002000020000000bab09b79203b93d9b8592dfd4e6a0df49e237103ca62756100716ef906e381a32000000026061b58b992c14c4974140d4934ca269b92579527bcecbb35d2db069f8f1b1440000000667eaaa70acb3a9e5e8e330aa68c261948c99411bb89744ca415dbc01eccf05f47ba461f03be37a6c53b3c8e8aca41692be60257581093b72c5152cf41542a0e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A44CC0F1-AC2F-11EE-B754-4A7F2EE8F0A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410665008" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1736 1700 iexplore.exe 28 PID 1700 wrote to memory of 1736 1700 iexplore.exe 28 PID 1700 wrote to memory of 1736 1700 iexplore.exe 28 PID 1700 wrote to memory of 1736 1700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b4d615a11daa7de4ce6d19b30b86beb.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d6cd54adf3c9acd2156152a0a713f6c
SHA1cc8b272a9b7ec157e14d6ca3eb764dec53475ad3
SHA256aad0533e3343fd72258ad724346b1a87fd992ff73c42b3a3a699bf6739b403b3
SHA512fb90f1900bcdfde16a2bc763b9dab53686dc8bc91cae97f34a34c067c36d1715e25247411afea79109d0f1b73687f520cb7feb860455cc641c2ae3fa79690cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7d7a54c7dbab136f018f4a3b9be678b
SHA1dda658e535d08a8649d46e2fd9a79dc88c63cb8d
SHA256b4a7072695d45487be64bb72a2895514493bb0008a27b78e40b5edfc51ec2f7a
SHA512f2d25015d61dbf78cc385db62ed5de3dd320d18b330e599e55c3dbea95573ec6edd439b7de145daf3c0d877c2c066d14d81bfb6d1b1fd211ad6a9b297739c295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b715e754f41d99206c23616f1e5238ef
SHA185a58ec6c3c9b61f941efa52ce4bbcc3e64dc91a
SHA256d2ee91425f9040433ac388970af76e26406f6c197adb119cda0fdc500a87ef56
SHA512c593a071d2b25eadc942c0c00959a6a7568695135bafbc4c4e629a739a4e9af72296f338eaf1c45d88ca8d550bf461d235ded6fbcb90573922110b8a0fca393e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7d0be6dab775a4a51ee33d6f4b06f8a
SHA1f946af76927dcce34fb79e8f0fb7233f95dad912
SHA256f5118f98b311f1e825f6d4989b8f66a68db77d78962afbfaf73cecc3ce3ba05b
SHA51237843426869c15c4fd88885154f08023754545ec1ae20752b1ffd4085ac8a1931696870667124745d024890f6ca9edaefeba9251704bbf4cc087aa9f5d45c90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c268cdeb226d7da5c5a382ccc2692095
SHA1e3f33dd4bfca0fa09ffa205e2b5ce47108e530f5
SHA2564641ef64b2936d2084065a94699c57c9b4b959dfcda9def4618bcf025c72e8da
SHA512537724ef96330c28f8f1560f63d164cefae4b9aed9fe9c3ba3244f59d49228c911492ae7077f581961715017ed34e3dda9c6ef22fa3a201725201802439ae37f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59353c447e6ca02cc0d496174910de8ce
SHA152e109e398dd7fd3f00a7d7f0891070f8576fd4f
SHA25618939d4f3491037c13184f86419af6b1e12ebdf9218b9c82864fd67ed554c70b
SHA51298aa4b2d8609615e76f2c051a305e181c75d6ad635782526166f78eb8b79a2dcdedcd06a17d7b01d007e90aca0306e3c6a329c1cf7542c42c33486d430301bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aead9b744b25c4c0b7c50c50570bb4a4
SHA1dd575985022396e0f00e7f48641fc47537d96ae9
SHA256c8129785b26036df9ca865726750bc2abfefad0f8b82dfc04814df8028f29aae
SHA512799fa1853274fbf3960c9a748cf312fbec77447c9d4e42094469b1792602957a7a107edc7798ddfd716a06c7d9923b77af968672784f4c79b4f977197d3a842c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bea4dd12f5bce405f8c617c8b023baf7
SHA11b32f46d9327a93d29e3429d0255680694c99ba0
SHA256f1a934ec67ee582169f063f9ac5a45bec9470930c849678f8d0dbb65f43d9bab
SHA5124cbe637378c9288f7430730c58f779ffce4cbd70395d34f32226a3ce3512064a6ef43836af615a7402e0ff84139504d8e5549064268b0dafaaf96d471073e3a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572abd72db3bead2a7d7b4e249fe54798
SHA16fd4381d445fe0194a8132a745cd63d09ad9429f
SHA256b882de23f1f71c2e49753f5505fd3816ca32e822b86c1963dbbbb5f2d541cde7
SHA5120f7a58b2655f6480af66942b643c3b8d4bd7e4d77acb94b376e7d3f8370a763fcc5e93ed02ad8a5b628fee1021ce05e0e662e4ec09a42f6f22ea8cc594441871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f2d5f9abdcf91fbe30ac2e61272aef1
SHA1c709ff29a0061fe571323e5f5495ab60192e8cb0
SHA2561c02ab3a95f977760af19b6386affe33c1f5d1ef39c10e96c7dcf079e1872058
SHA5127540e782ac63af30977af0b33c96d41cf7d408865899e6d21dd797325422c0e23d2bc095dac9b5c30e8493837a90d5a1f769207c38be7aa3746d85aed196bf10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f902fe5ffa79853546c6c13c7535e1c2
SHA1b71b88ab8fe29790dc0b755a3c2cbb8a6a099cb8
SHA25615a0decdea0ba1a3fe0326f7b381ac868d7004f25dc7e612e414c4457ae9db5e
SHA5121d110dd5e8886839d128c1ed4c2052d76499e89ac5e2c24d4ecbcd6197b8c02c062b14dc2f21a4ebb230bf8c47dd5234ecb4538ea3506c13c45dab7a0e678d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be2497be4b69e83c7dd813c672eec2fe
SHA1c2c2058c27ef03c0605289d58394da354e89b3fe
SHA2567c9846e7be2f56a0d05f6045c0b3e7d42080cf9849ad1a822e35e8f73ebe19c8
SHA5120b75f65d32673282f38ba8b99c24e662467313d2e352373796e0608f1414a93ada91a10da2b80bb83746bd18f3b326991c36ff5fb97561dd7e65c8c381ac8b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d506bac52e216dd5066eeb9c62439c58
SHA1984f4ef899f187b0bf2d1d564fb6e480cd3c5b2b
SHA2567d64b61510126a9b4e46aa4d6dc2d8e4b59ef2a3609d803f1ab003da92a93f7c
SHA512ff737a9176d8d2029bc3c1d9c009643bd1693636aedff09d67841e891b7617fe7d4080378777f0bdd28cd2dcb1e287c3d06666e5595171da84e56044bf28b23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558bfc3925e414172c81df210f905a335
SHA151a8ef2bab3a9cec7b7761ed3d379101959cb1ec
SHA256b15074deb8b78a81cc20ab1c586ca94336fed3d196a1930af0a046cd2ffedc35
SHA51210c7384509405e7a6b6095aaf715e8793753d2d07c6ab3b3067e3076ca88cec7dba4d7a69f9012a5e1564181b7724aefdebf542358e2dd35e7bde980a7acf587
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\beacon.min[1].js
Filesize19KB
MD5dd1d068fdb5fe90b6c05a5b3940e088c
SHA10d96f9df8772633a9df4c81cf323a4ef8998ba59
SHA2566153d13804862b0fc1c016cf1129f34cb7c6185f2cf4bf1a3a862eecdab50101
SHA5127aea051a8c2195a2ea5ec3d6438f2a4a4052085b370cf4728b056edc58d1f7a70c3f1f85afe82959184869f707c2ac02a964b8d9166122e74ebc423e0a47fa30
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\jquery.min[1].js
Filesize83KB
MD52f6b11a7e914718e0290410e85366fe9
SHA169bb69e25ca7d5ef0935317584e6153f3fd9a88c
SHA25605b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
SHA5120d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\jquery-3.1.1.min[1].js
Filesize84KB
MD5e071abda8fe61194711cfc2ab99fe104
SHA1f647a6d37dc4ca055ced3cf64bbc1f490070acba
SHA25685556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
SHA51253a2b560b20551672fbb0e6e72632d4fd1c7e2dd2ecf7337ebaaab179cb8be7c87e9d803ce7765706bc7fcbcf993c34587cd1237de5a279aea19911d69067b65
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06