Analysis
-
max time kernel
0s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 00:39
Static task
static1
Behavioral task
behavioral1
Sample
2201886ff6e0b644a70dfe744ad1949c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2201886ff6e0b644a70dfe744ad1949c.html
Resource
win10v2004-20231215-en
General
-
Target
2201886ff6e0b644a70dfe744ad1949c.html
-
Size
79KB
-
MD5
2201886ff6e0b644a70dfe744ad1949c
-
SHA1
6dce37fe157ed82e7fa6c7d3f48218ec0a7cbde4
-
SHA256
155fe8d98dc251f3c0a9d0261bb1c8af8678fa60948eacca178d15c410a30fa0
-
SHA512
5763f3e273598380ab9f4a8de006885dcf3bfe033b65135b2a633f24f1a165fb5d7699d1f38c46480b5cca35d2d6376994fa6f677b2b186f2c3e15246b457b52
-
SSDEEP
384:zWYYo35xCHMsV1oHHXfPWd7CqDVVVVhtptptptptnHcVnujEhX2E7ntVLbVjUQ2F:zp3eyHHvPWdt7SnujEhX2qVN2RH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB127251-A8C3-11EE-83C2-FA7D6BB1EAA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2820 2080 iexplore.exe 16 PID 2080 wrote to memory of 2820 2080 iexplore.exe 16 PID 2080 wrote to memory of 2820 2080 iexplore.exe 16 PID 2080 wrote to memory of 2820 2080 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2201886ff6e0b644a70dfe744ad1949c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b39228a3eec052de8355fb963ed1dfa
SHA1811ff232c0858b4a44d414148533e27b0611be9d
SHA256cafdc09d2a4d4af23432f2426769cac7d1c91f376e3f23ca773e6daf9f7f7785
SHA51232dcaef3c9099b41de8f4756a6f9319bc5fe1c4126342eac114da267bdd5ec08b6b05d5ff9a85baf15f528d613b72eecb235ab20ebab22b49aa8d3303a3dd413
-
Filesize
32KB
MD58fe278bd8eac660d0161a869da96b8d8
SHA1eac6f73862d89fc8c49b5331cabe89b6a57019b1
SHA256e8a6de34603eb9e91ba82f555080758e480ab044ffa9c140028706f916eb2c0a
SHA512b180b8df22e421493dcc75a2caed123f7c7756295f691579ea5c426c741f80e381b4960b5cbd6b5e87547d75e44ab654d1c4704fe34b4b743a57f334bd05846c
-
Filesize
30KB
MD59cb78c9652f98cc90662f909945e02d7
SHA1246bd43bbc7cf53a5aeb3ebfc5353c789b55bd24
SHA2560017f6d5e522d564d37a2e34be24fe91801df62d027ecb7b7bea96dc288bdf53
SHA512f9ec1fdc3dd114529957da2187c460d4a65e1aa2a7d1e2cfc2bfc8a6fc705fc6fb44c9ac35602e2711f485aa665572c78722e56a3b84a959c75443f230fa07dc