Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
212728a2f83d87d1577a94e020aa8ce2.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
212728a2f83d87d1577a94e020aa8ce2.html
Resource
win10v2004-20231215-en
General
-
Target
212728a2f83d87d1577a94e020aa8ce2.html
-
Size
49KB
-
MD5
212728a2f83d87d1577a94e020aa8ce2
-
SHA1
d4e84027c6130e0c4ecf182b9ed00655e76bc1c7
-
SHA256
c407812265cdad81e6f22dada1d2f6a4584272ce762fcef924d69afb05827a6b
-
SHA512
d9fc9a9289a0f9975630a697a6bee716e132694d9f3591c6c7657a4852bd21fd2562d23db49a666df4cd985231219d1e893e6d7ac5ecf99ea5924f9af28e48b8
-
SSDEEP
768:Okg7arzBENeMtmFZNsYA6Ozu1mb2zNTzhDAdr:U7arzBceMtQZN66OzGmyzNTzhDAdr
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CFDCE121-AB51-11EE-BB35-72D103486AAB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408fc9ab5e3fda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410569711" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000579a7ce72da231ab9fbbf77112f89a8c4a0f5df4b881fcdfb97ee602b4fa818b000000000e8000000002000020000000753b13e74092ba98a7b07fde68ac627d655ff29669a0bd7995c08479238a549d20000000c88437318a7e4cc65787f55ea2168ce4bd8517d8523688992487b86ead280fd040000000cfd84927f68c6be92e00e360c9c204ed705e15cceb0f6340d52a46c64c5a9d810e264f7389c5cc704e75f67e586d56a5d13fea3bd6a3f43f40672c579a0029bc iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1968 2932 iexplore.exe 17 PID 2932 wrote to memory of 1968 2932 iexplore.exe 17 PID 2932 wrote to memory of 1968 2932 iexplore.exe 17 PID 2932 wrote to memory of 1968 2932 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\212728a2f83d87d1577a94e020aa8ce2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f474d9da526115f7aefd0812977a7919
SHA18a4ed4c8e32f664dee44aa93d86e69128bb40c63
SHA256f86ada2adc625cc06baf7b506d0383eb5cf08f9cb18e61fdd3b2cb2fb2392587
SHA512a1f5ac24eb47f5b057605be0059141675a9f2cf715d722a295f20f5d9ff05c50436aa50b297ab7ee471ac3abb6e9a3076c04fb37d3e758f3a855a1996fda4e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5622a00af2edaa94a119624aa720bc192
SHA156080c524393210ad9b80f9b823692fdf3868fac
SHA2567d8b833f618dca62316086b06b427cca7fb413fdcaeea63106e4b09f2b22246a
SHA51204ebda52b9637ab9e9f4b2ea9e5c1805f99b17f8c80b2373501d364ed94c87152d00259bceca15fe25734e2fca97010bfd4f06920ecd148cc26e971f0cd48f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfe5a52c58b17101ddd5a326efc2af57
SHA1ac29c225b303acd866282ac2b0bad2a738b2b152
SHA2561b864be595e1a5a529e5c43d189a9504ba98cd7a5d3b8d3c53dd0539dfcee76e
SHA5120fc52ac3e152803b2c7f82056d6e27d2729e060a485fd14c3da7e3df4cedd9376b77afe7393bebe8f71156c6e932d22fb7c5aa9f92f15679cfac77c7dbffba53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2e326c803c5f9dbec6f8c7993d5f818
SHA127bc85d12ed0d6f865b041080e6b04300937cd63
SHA2568404b30d85ce6c4bb2e8a397fe5cc89ef1e310e98c434a6477c1fa282fc28edd
SHA512f2f2f83cb1c2bfd1f6231c725ab9a8335b6ba3389405b5f12dbc1d1574bb282dc4a54e2f50f58ce35c110c32c269136deb0630f53df0196713e59df9a05a7262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f7442c881f62a883acd3e9ff32246fd
SHA1b2a19c57a02370cf44caf7879b0dad571c3d050b
SHA2562eee0b2b95e0d3405414167a7ba8b151e82c1fd63042b669ba49519a5a976bbc
SHA51256c4d8ea11e023daf1060db18051c01d558f196a7c2f736b23d4ade339e34272cdab6b604a1dfc71ed7c98d1e5e2a6f0ee96c10cb9e26045cf1523192aef62ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a071ac86bff9f6aebf6140a26b37d9c
SHA16530176640afb9295f82276abca441d1ce289ecb
SHA25611715d542ead74c13e9b057ee950d9f631f4331754deb43ec03e850774386fc7
SHA51266ccaeba50c9f739ea06ff23294a9fd735111369e57abc7402cf39a8175082103fd45c402b8aa9bea7cc22f0b57e4683c038d1824a79a91bc8d5c43fccb8fcf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef212a06981545963512975fe0dd8bad
SHA1574f2a9b8a7c839d54c16481fa42facb089358b1
SHA2562366fa46459f09f9d524bc94aee14d9684ed87a38574a847a238f820ba7cd3e5
SHA5127bacefb00110a06b46312f8962b458c169ae44bd4dbb50c49e2bea9565bd447131afcd920b9c06fe6441a5b363ea142bb89b0f289564381d7d7f743ed0303be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90c314b708312ceb6ca15681292cc71
SHA1112970f35db9ea5160f5ba82d74e4a984b6ec7c6
SHA256a8f8495ff8b979a7436b322bef5dc3556c19ccd82a74c47de590326122b55e7e
SHA512657cf4fae2aa9ec05ceca41f15bb4bba3abfe9a2ffab3ae6aa7b794c7a5f71765d3a3d454a0cc0b1ad14b136a0c0d0675f0babdb3042ef4b1b98b42ee54d3924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1c201ea7fe3d5bab758bd63f2be4344
SHA145bd7f8c36e7196dda7386c654b2637d95458f96
SHA256b9eb3630614580865110380345063aee28629532458e1f5f6160c51503fda410
SHA51268855564ceea6dbc753c0cfc044ee0f94f0ea130bd19e857b0b554025c734d9fc3cc2a27c0b56f4838a187cec4d8cb24d2452b07f7a33846d6d90f5a73dfa422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4ac5721f83a3397085bcf802346271a
SHA15565222daec4145da5046100a7a9fdb7e73bd8df
SHA2568a47deb204bad5378deacfc5aea8ab6e619c0d5aef9953960c0b77b1775a3729
SHA512ee600c03c7283e8475c279b260a1477d5c6a4218f3c61f60afc8447b4a97791e1a6e6b31917cfc9dc3677e51d448ebd30036de0f1e4ca749b7a0fe5ae7aa8d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fedb7c9e8bbbb421d94894fd111a1c75
SHA173dba936953ea2cbca27c112f894724cf861b35d
SHA2564f16be95934ff27fe93ec1648711b1ec8bcbd6ba7ac9e62ee84751b2c5ef221b
SHA5124efae4e52462e7802ebec58d681b57e75dd567c7f77c9f76d84f2f683a8146fe9bb11f66fb0c54cafc1769a78a8049d9330f5663b43376a8b869b5776766d0ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c5675bedfca8867db35947ce1c9678b
SHA15cb78f3629e04299b0864c0250085bb1c2522bca
SHA2565de0b331994a5a24f3a865cd5fa28fb0d89eab7dde0374dd4c5fc8748e55d5c8
SHA51265ac488d7c4ae0a67e625bc3edb148b99f173524fc1f0153cee5a8be3fcc7b27903abfe347716665d4681261270153640cb79c3479aa9af3225d04f0f915b87a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6ad2ce4bdb4b317dd9e6b48a01e1833
SHA160a442f964b631eae6e8d1f0908d7aaca8fafbe6
SHA256f8f9db22411aa0123da0d358b5788dc3e7cd2e734d73cbceb1974da541fb529d
SHA512ca762e72576f91726b81ec50474c2c5bf0e6539e541f4e1b52a91b809e08ff5283d7e0074c6ec7cb68855253ce7ceb6897c59a8504c6aee1fd602f139fe0a33a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c878f3bec61e07c65aef968eb438ad6
SHA1586d1e49a3db337bbeef1cecdeb87d1437f5b51b
SHA256768b8ac08a009e222dec5d9266f0b10d2bc07ad77547d5255b993228b8a0cbe5
SHA512df1a081b6c3894a667788fca284a79c25e2b4e11a060e773d1881c4c29d869d55e3d20c26d912b4aa7f006e2acc98acc2cbf3dd405e163bb776e882af632b41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55f76f79ffb84d80ed55371631afce6fa
SHA1f8fa2e7b8e06a96e7224c856730bde62a230a2ca
SHA2561c96c04438ce12b6a4b3ace54270897b24e387d026f5ad2e3791412da01d9a18
SHA51235b5079f27c174424b067ab0b798a857ad8f72319838c104a03bfb5714a3a058cc40d14021711c5ed867f575e57ed0b08b92934b9258b0c5b6eb7087f78d07b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06