Analysis
-
max time kernel
15s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
225712226a8b5c0934489b8f57530e3b.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
225712226a8b5c0934489b8f57530e3b.html
Resource
win10v2004-20231215-en
General
-
Target
225712226a8b5c0934489b8f57530e3b.html
-
Size
432B
-
MD5
225712226a8b5c0934489b8f57530e3b
-
SHA1
3f6e2ac38b366fb699f0fde630cc51ce87ebf673
-
SHA256
58f0d2c9a1e933d1730e8ca4c384fd59e5dabd420c82760977cf6552bd14ec3e
-
SHA512
8d24f8be1ffe1230962826a143acc308629b2abd92e2bded7d441e5a3b3ae260ffdc750cf0adf04235ac9f293488fcb9da6eb5835eaa42ef4f4cc316f02612ba
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e80a04d73cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B155511-A8CA-11EE-BEA9-FE29290FA5F9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000e9cafff956eaaf56f564486e64e67f6ebf3c7450e6701ed25fd25bed2c42bef9000000000e80000000020000200000003f9cc3245a5ffa320b8d3f7b893c6cd2c34c5b2cdc17ff070f9e00a69f9d871f20000000c9f0331328f1986a9868b7109d539965f4cbbce6d8d3e88fe2c1680beee288a540000000c968fc6d4dce5bdd1f263eae5596edecd5e992034cfef84c38915f11b5ac66dfbeba2f057ae8e541bf5d20b8023d3957f454cf6f33c96796ab1395e5fe8cb3a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1540 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1540 iexplore.exe 1540 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1944 1540 iexplore.exe 15 PID 1540 wrote to memory of 1944 1540 iexplore.exe 15 PID 1540 wrote to memory of 1944 1540 iexplore.exe 15 PID 1540 wrote to memory of 1944 1540 iexplore.exe 15
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\225712226a8b5c0934489b8f57530e3b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1540 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2c5681e3184744bb0475e1061aa9989
SHA13f23e1494b99f6249bf8b6713edd1a487c7b1e26
SHA256c5011b4c2c3e4c9a10cc4a2b6b6b09d07d0c97225d3c3f3c57e651fa2db5f1e2
SHA5127c351e74ff79ed8d35494eb62ae871c3c2ef66380d90bb42870a20cfc68f6d384fc547b9e243e5fa1fe42e82a8d1598038919c8e45314eecee9aee85b6a7c5d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500f2ca3dc23c31b3778e0352625a7b72
SHA1f29140f3fad157f849b5376b40ee6b688cae7cca
SHA256e45d95deb6a09aa28356dbf1af20b7d1cdb848a4bc72de35d8a44da74feb9e83
SHA512756eacb78c00828196bc9345870ea7c3ad2ba6d8372ec50a74625fe540369f4b0436f2992d2b92f650f5c993c17dde58b4b87e2af5a925d25d2ce1ef5849bd50