Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
22cc0e0e36643fdf8e4815bc947dc4c5.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22cc0e0e36643fdf8e4815bc947dc4c5.html
Resource
win10v2004-20231215-en
General
-
Target
22cc0e0e36643fdf8e4815bc947dc4c5.html
-
Size
22KB
-
MD5
22cc0e0e36643fdf8e4815bc947dc4c5
-
SHA1
09278db4d6b0d21c04425e6028fe0447baee0a3f
-
SHA256
b391ae9f0a9415ba405f86f98107674efb45fc7a681972a5adf2f8be6e510b03
-
SHA512
d5d08355d3e4582e257cc2c20fdb9614d9f38950e2189c9646db18ec121f60c114f91482d0c0e68c677057664704bf26708358101a2426c6026fc87e5893937e
-
SSDEEP
192:AIG+UEJAqAqyUp+/Ir0YQIP/4MCgY1qPhYb8CkPvKaNAt2X0ukbjegyegregreg2:e+UMh4/GPvYiTaDzNfxyihR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC5DB6E1-AB6C-11EE-839C-EE9A2FAC8CC3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410581275" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2360 2296 iexplore.exe 28 PID 2296 wrote to memory of 2360 2296 iexplore.exe 28 PID 2296 wrote to memory of 2360 2296 iexplore.exe 28 PID 2296 wrote to memory of 2360 2296 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\22cc0e0e36643fdf8e4815bc947dc4c5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522bc014aa81922ba3fbdfc1461949850
SHA118b3f5120a2ddf7332836509950390fd46c092cb
SHA25649687c27f53d9d775a0d4c52ca878678a5e3c4a06d58d89b8a4370524262c27d
SHA5128f8b2ac5d7b819b8d95eb11564d7cba963130856880d09eac5c20646c41965ea4984aeb9152351a216694a068feea95660c3bc5b3a28f68fb8c615a8929c4075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc1eaa52480cc1226d7636e58c957a45
SHA115716d5cc6b2eff83a1aab9da52e14db269aa1a6
SHA256b938fa31faa9913bb4c3e907ac3171b907ff23122102dcf22ec613e5954a0752
SHA512499b73ff665d3d83e588359aa6fab586509b838ac14bd195cba5662c0d993596c86d6ba612c99c53789461ea387c8dd1535a2c377fb3f62023681d2e5a52b6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cd3054cb1548e5f014e5c0c7f59ce2e
SHA1c7ed8ad78ff1e1dbd4a6b954e04d789871561213
SHA2566b517dbf4479e26680a761c160f00efc27109436134b4cc506b62274cf455ee8
SHA51277f36adb749b10c638682b084e385633f7e1d28abeacff35876185aec30b26692e5d4b7d13b6c207b06253ffa8a4b023eec7735158a3961a7caf913e121d9fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5512067da2fb17a37e4dde4f046a23ef7
SHA16ad0dd80626ce53584cfaa9e7305484ecf316ce1
SHA256977360752715e8764b39955e4f48f0d2ed154e85a1feb5d187f27925c0763a1b
SHA512bf4e4a755e57e03df97268a93df723fdb83dc63906e921e5e0e18b7009d7e960b0b83cd61faaaab3a8cb19d05de1b11339b7ac180bb4aa9c62fdc1a931f3a4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554ab089edd60f29466dd6148ce2d3d73
SHA1f5762c738072475d5bb906490aab0294a9dea1d3
SHA25624029ef3455ca43059b9d509c51c380776b0e88d201ff4218155a586997d412f
SHA5123d5751db47ca8a3bf284f29f95be529e92d6e2daa9bd8584bd7aae77061d97930da0974fbb6caa46bb8d13bc4705599809648c6928470ca1ea14d42bc692f695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cd690f61896775c62d2d6541a195853
SHA13874193f2188108368efea5a10a79544785c580e
SHA256f8986d3d5d4a7a03bd78bedb35d2aabdc6ce97d84fb0c5ae713648d232b5d104
SHA5121df06bdbb8a0b0544153eaaab098ef57d4908e3d215e2d02e1367dde186a64b520d27f2f952d9fa16f6e7d9cf2efac91b4f0544fba6a1e4554886008a2a8ecf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58849108388fb7738c768ece578d5f0ed
SHA1590a43f208454773c51572777c91fe85ebe8b9aa
SHA2561362932b35526196bf859c4907fc262626e21271a85e1f547c7f04b101019cee
SHA5127ae3fa14d4fbf0e8a9019c82ba4c3e7e89bd235ddf5dee584af371906bd6acf68dd50ccd364659e292ef2e094dbe55fbe07e3b0fdff4d95cf2789bfeac248c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5781296c80d42ab66280693b9d31667e5
SHA13a39cb8ae94c0da20dad2c09c2e878995c17778c
SHA2562a31920e9359050720d821aedc6ac8541e2175ca5650aa553bd04fde14e61352
SHA51256c8ae3dcfaa0bbf1a31aaa5d9b9b19e2c8f00b20a8f9fd403e182662c72df71e7ea803257b81a9d4e1ffc3357fc9538569c0e73c8241e0601460a440465afa3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06