Analysis
-
max time kernel
66s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:01
Static task
static1
Behavioral task
behavioral1
Sample
2277de4ff215b52dc09f61e12c70e518.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2277de4ff215b52dc09f61e12c70e518.html
Resource
win10v2004-20231215-en
General
-
Target
2277de4ff215b52dc09f61e12c70e518.html
-
Size
181KB
-
MD5
2277de4ff215b52dc09f61e12c70e518
-
SHA1
aca2db6cf45ea50c9e2aede7f7e52e7892e97626
-
SHA256
82bd08b6f9f621f1ae32d25a047a0de2fdac48f697dfb2b727aeaef2bcda9ce9
-
SHA512
0057528e009a85be3f52c02c5b0f4ba0e619aace49df35b4185a2aceb78d72720d7ce5db86010529171b0b091bc07e83291f9a681637ad92eec6e46964479bed
-
SSDEEP
3072:1a8ayfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:Z/sMYod+X3oI+YS1tA8
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000002989a7fa687073621f5e97796da31cb2682cf9f3ce92364986fd0374cfed72f7000000000e8000000002000020000000692848313e7760f19eb12079be97668d9fe5ef07f93c23ae8e33262336f983c390000000903a72abba2395f5505158193abd659a0f8b208d490a741154b4ca78031e74f83944dfd8f5e5ac4f841e4f2bb246559d667f01cfd26c0ce87af0e3eb4c58f1e5292ff7a1fec514da3a773449884a6dfb318580e2c0e0ee7d011d8cc59112c7a6b34fbec9f8389bc3aa5174737f987372caf073282f85c6079529872a8caeff5dabe15d8937dc3416e4f3b9d9645c6742400000004894b62f0b8e400e8b9eb41a95598280d194636891b18b6ec75f9fab9e2fd184637e8304b812ca383fbf69dd9781770806275f20786b712db7ed667be1f92ec6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000969ae0a0292138bfca9247e216b23513fb0f1039640429b257970e3614fce636000000000e800000000200002000000084f7bf4f5f91335a9079478d0887f491cb3d2491638a0ad46bfa840a154d402f2000000036a80c38dbee22bdc583efe9766f6d8a56e1d70dd24febad95b6667309fb61674000000094940682f540eed899d8f62198d7e3d214630be87bc36af9efd5db10da23ebdb33227e30666ce0a6b936600fc834e32e740eb29226637d303f725c76d2949f5a iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00dbd4f8d93cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{242D9081-A8CD-11EE-8A35-62DD1C0ECF51} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2764 2376 iexplore.exe 28 PID 2376 wrote to memory of 2764 2376 iexplore.exe 28 PID 2376 wrote to memory of 2764 2376 iexplore.exe 28 PID 2376 wrote to memory of 2764 2376 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2277de4ff215b52dc09f61e12c70e518.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b95fc8899bc9a3eb522c766a849ae35d
SHA12353beedfdc4b1414e0f75025b0530d0065bde31
SHA2568ea7f9615f00fb18648b9053d2b5e5893f68930e51641de2436abf0c2568253e
SHA5127f962ce222c48daa35411c59cb83ed25b1cb961a6d9887252a4ffd7ae45612e1efadca0e2d4433635e6527a598e98dee34998c023fc51c0206da959c98841385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bbcf2c199be99a21115498c79cc971b
SHA1ac10a2297f01379e6b51094e36923dad2d75d4eb
SHA256628ad235faddead12a8ea491c2b16c057cda25207fa7247ac7cd0e6294e594b6
SHA512e97d0cf2172d3b209e180aa6792b384b04ac8e82413be0b0b2be738c739a359ee5c37766d252630a081673ad3113c65fc4a645c8b52ead34ee3b3d851bf0f8d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53971a71021eccb05cc4956903d607d3c
SHA16838773ef4ae3c3ecf1b547e55991341fd4abfbd
SHA256dd811cfeff010fd7000f69846592cde39214d2e34fd89de23149e84387f80ff6
SHA512d16c9adb27c14c961ff08a72ecad998f0e2c9c645b324d157b97183e0bd73a4447d0f35f1fa311f46bde47287667cc67787c1fb746cdb3980e2d53a7003018c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a75abcec682e39285ab1bb504cb91438
SHA1a5cf438dd880991a22783e4274c81d5ab876a099
SHA256b80e542ed8fc91117d016d649c203efcecaca1bd3be027beb8637890d78078b1
SHA51293efbee8ba27fe8bc8385acedaea566fce77b2f4814e23be59ce5f8dcf758f457c4a60462d69692ad145344ed3e368c0d80f7023060ca0315de73e35cddd9885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4273db3e63932c01ff45b89234f5139
SHA1da2deaa45174797edc4c5c6468a4e2b8965829a6
SHA2564091292db4e904cb0f5f33f86777a7bc151f80d75c2a943f6a5d694a22ef0382
SHA512f1d28da165575344b67f0eef2a8fc1f96f3bed96253798a2784c0b90dc69376204e1506ad54931d3416a01f1dd38cea5f31e8e363c03cd3c7481a1d65b77031f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557ca30ce60c8d9c3122a43276da2df82
SHA183e29e56cffbb1a32f3344bef8daafceee6f7006
SHA256a1a122849901403d88395563c70d7c4e9206a8c38159b4cbbbc1e0720e9c8953
SHA512b0145517117ca869cfdc2a37f7f6073c84c48211ce41ea1b9e5201119e3e2484a8cc7a473ef49c3ed1326741ab8dac39b3fe8cb00cfb1340cbb63c227428cfc1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06