Analysis
-
max time kernel
118s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
21bba4efdb7eaee2140f0c91e6561fa9.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21bba4efdb7eaee2140f0c91e6561fa9.html
Resource
win10v2004-20231215-en
General
-
Target
21bba4efdb7eaee2140f0c91e6561fa9.html
-
Size
131KB
-
MD5
21bba4efdb7eaee2140f0c91e6561fa9
-
SHA1
14f52422fea45b6e78ac5c4ca1b81188f849dd71
-
SHA256
61f2cbf7613cd10d620b716391b732ad7a694795f4f490a95b46e0223f64e847
-
SHA512
aa6231ea548ed46ad7870b66b8eb9858d19d1e41ad48e27d327ba0c028db00832f07ed3dddcf412abb9e17592e72b1e5fdb59a3d2684618c3ee36c334c0d357d
-
SSDEEP
3072:1Dl1i1cllndg/+NhwgpegpYtti4sMHI0NrU:9Li1cllndgEhwgogpYt7sMxq
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c000000000200000000001066000000010000200000000de5d7663b4a3ee489278f6389bb4508f197a5e87b0cc6be3ff04a1732061151000000000e8000000002000020000000a5328b111d43462722b1d1a5018a3d043173221437ea4128e9c9ba6602594804200000001d90ee491a9ab806fb0205c01958a3b054b0f0e675820fe2d081b7f398271bc3400000003a62675ef8d55137d188d0477c4bd85c96ad5cf026f24ea3360509744aac6d1f137d64eee76f645b49f90c7f593dcf8ee53638a5c7fa263e87cb278826d35a80 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0520bbf683fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410573998" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF68EB91-AB5B-11EE-AB16-D6882E0F4692} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1220 iexplore.exe 1220 iexplore.exe 1460 IEXPLORE.EXE 1460 IEXPLORE.EXE 1460 IEXPLORE.EXE 1460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1220 wrote to memory of 1460 1220 iexplore.exe 26 PID 1220 wrote to memory of 1460 1220 iexplore.exe 26 PID 1220 wrote to memory of 1460 1220 iexplore.exe 26 PID 1220 wrote to memory of 1460 1220 iexplore.exe 26
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21bba4efdb7eaee2140f0c91e6561fa9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5455034feeb43b9d32dbe931f0e996ee1
SHA1c2e67f01963d16c133f93efaeb3f5427c86433aa
SHA2563bf107667b511e7d55b9ed2c36eb0669aef17e0a31b35656e20092b1f79ac193
SHA5121727252857c5bc228f27a323089f488516682d00a991e9e99c7c899b21e1012664502595a72ae6ab4f7077b00d7e96278568a731799c138bc758ae658a980f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ba244b38a2637a25399fe5ed77dd471
SHA15b2fd83b5a648e35f767c2347e7355b79dedebfa
SHA2564c5f011647951181d965fbb3216a3fc796ab49e26e3c5c7ed48a7feb7e7af7e5
SHA51257a56cc818b278130918826164dffc6a95beef1a7cb4b1d88a470262e36c8ca0e1d5082ff458111d004ccb3a543a743b0bfcff51e30c790d4605d5bad763d86c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5169c0fb9664aa2e7ef99d20fe1cf2288
SHA1b3ded0272788a8db7f8db091e6d5dbda7f78c9eb
SHA256066e0c157c7ac61ce17deeeeb8bc2dbdb59962888cefe44c5441fbcd66dee8a5
SHA512e36c17684eefb5b2d72bfbdc99b56245ce50fa57205fb0fec32d1e84dc2ff73246e31cfd15cbe60c1863b69b85566facdac4816fc1345773128444bbe0d5e021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ea5b2b2de9f4dc44e35225ff73e5e5f
SHA1326bb26217cc4d0e0038046cdaa7add6c1690db7
SHA256714673e0bc46c4cf5d29d8bb2e68408de12c5d4b7b08be4f87a7970255ad9221
SHA512688cfae233ab40538a5ab9804772bc313cc267256109de26c235de725b5f800190459324c51cb8ff527c18b523a5a554f426bd6234e49d2ea14d939dbc9050ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522dc06566f7674331682b50ee750f372
SHA15f675d064891ed4804fb1dc92e401ec09e15e73d
SHA25663f476795fb5193a51a208ba9e2f6ab5af721e8fcca02602516fc1f54ca29dd7
SHA5125010e3afeb0a78be8c8c199b722b8d8e3aa47ab652d1665f28e8516b519b37db16a7688cabb5b50a4c01cd838ad9bf907ad55700f3a888611d6c8f8fbbda94b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c831d7572a4d901eab72b638a1365c2
SHA14de40e49ac779dd6a82a63d54dd3ddf0f7e9211a
SHA25699b189136928aac6a9f5e588bf8226d6eb2a2003561973d138412ad2dc4b79e7
SHA512f1ecd57960e5d97babb30a0adf1d4d9a244873cb672e62c82b2f3295487c554180e57972e7debcda950aa43d9b2a66be8f8ffd610977478b68d67cb5ce39fb50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea804818acf2d78415300f22ad4e84bb
SHA1b5515b9b57e69a6afbb4055433ee0d840f695d61
SHA256905def324e3784c6ab6102bafa9022f9689e4a26333420d4fe0ecf8050fbc498
SHA51274f276ac7ec9a9f882e4a89890cc89582c5269a9a8da2d9b44fed277182d8050463c0a205baaf0a4df89e3255f0b963de1e03b4f48292d5b1c6f20bf8791b513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5398b4f0d28a4317757dcee6ceb32d3f7
SHA1127e7b0dd16e6143d78d12191875e020402551e0
SHA2564c88801b8079170fd1e33f286312b1713d603e21207f0e2a9f6ade1725bfe98c
SHA512d19388a5a163bc75c14abbda97d8d17d5d05d2e57227303d0bb0ad590c02c4cc283bacb4b0f4a590e656626bcbae5cf19ad2ddf5a0909c73afb6089198c5bd90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526921a0476cba73e8f71072654bacdcf
SHA1bbbd2c0563986f75d2c493eaa580b138d22b8bb3
SHA256d3202ff5dbd546826275de3addc8e019b599fb50c80319bbb3c3dbf76fc10081
SHA512b4bedac15ac4647da1d73d44c8fc68046920dd0552dccd7c952f8e682c53d24640f0de7ceb0c0d7532af4597b7978836db50159a8d7bef799ce628ea866970c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50327a68742da71b6a51428003b3b3d41
SHA151905be4be04c77996dcc4958dcb42a2fcd5d4d3
SHA256094089537adbe140f2e3fbf4a825ac50218d9bc5e38028acf5aae23f645206f1
SHA512921934fc17dab84fee24c32c4a0c7127bc0bc3ea94c873839d9252d2c4ce1cf5a78691b98286718fc520697483ffe4e952a65929b353ddeb4dd4f9b39a191745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d9eb97d4069c12a95734ed6d064dde8
SHA1119f2aeea68ea6ae3ee9dee09c255df59e98d7a9
SHA2569eee9a06cbeab6af9e5ad7f3c0efca7f3db92a95d80985c4ca2a77ae976da237
SHA5128054ea188f202c9b41a5151c01fde56476ca3e717bff5629bd1f0b2cdb386acd474ffa74ea3354cac7e5a9f3fa185a0983792c189cf2ab076f2fd7b794fbf08a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5055a2a4d52c9dd55b8416c68e4858d4c
SHA1ca71a3477b33f8f9c30fa0229dbf836031fa1051
SHA2567238c038e3a0ee91055dc22142f272a1473ef435205896b8fc7e89774f8ff778
SHA51284e0f5a3233596bbcd029a50a9739cd623f7fd1e3038ae1aa44de5f137c0e7341b8552df77a94583599a129eca1c4e7db3578fd5f78776d870a3d074a628f2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7e79fdee1a8c9b86b249c3d05eb94ba
SHA16f014d8f0d92009a2fa4f42db1d1a335b2ad3be7
SHA256a13353f840a0c0030ecc2ed303e058b787de03914d4a5823969f826e2c444ed1
SHA51236b86c7f93a5573d106c47624e1de12ea2059fcb40cf2d1d3939e5537e3e04641df9e3cd13fbc3933b7fcc47bc549661a4b345bc293ea9c7df53e535aa84a7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585d9eeaf20ed5b8396e233f32c1738e7
SHA19c01c8f61eb701fd451a2e8d9752991d23480a4f
SHA2563f641ae745b45a100b6ce5a2a325785a3c200d4049e278a84f2f3c8457e84f2a
SHA5123bc2f33d2fbec3ba8ac79efa0093586ca7b5028a8265243bd230322e187bfff5106287ae26ba1957b2babc6d9d7900e397c1f67c0c50008a39daf8ac544c9389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d7aacc5d2e65b7b9251082663de7752
SHA13c4468469e06f379eb8815ff4788f3e36b35af92
SHA25692c749915d907b87babd66d4cded7412d392655422b297f91c5707b31a895cf0
SHA5120d04e5f6b89d067e302f068f684a9bb8ce1426882412890e1a633b373cd03a7ea51cd3033c6498f80ebc332318e83df9ca36175be998dc0c91ace28eab183963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5215c858efe99c2a526738a6056f04503
SHA1c03e40c8e002283ab860193626701f974813ee3e
SHA256c4817ae301e67f3760a24087a9d8becd8e4256513f1971e994bde919c73a22d1
SHA5127f9d6d8348f27d1b8fe5c15c6cac2ae07b23e47fe2c18067dae2207e7c049b5b9de86b317b0dd4ab0403fd7e8f6e55f4688b22a41e07c1c63805bdb3c910a85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd7e1963a523e2ce4fb83062cd6464c1
SHA1f6bddce28fcca156f27bc44ca6236a1fd922fc15
SHA25663a0a6c75140b72b57cbb142b3e26ff33ef6de364e1b1f5b0e8e81d669e71d89
SHA512d8ce0a80798cf067d42b816ad97193ff81347a243cc152029a8207b60a54aa6ab1060b7fd02974240dabe5bf1a2a0f627166281289346eedd815fa2c8b642c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3034c4cbcaa7fbe8380c075e246ba89
SHA1181103f324b6f11331d70f89b66210587e52054d
SHA256f68d0ddd378762ee97018d46c330e0155b7ee843337d676b106160c1eb9a036c
SHA512b6fb1244745544f70c7bb76f2401c22f162721fc8e9eb71ae2aea59faa3d503cae2969fd5b2c697590d312636ddebe17d2321e8c998450c509ab54de2d17507f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06