Analysis
-
max time kernel
121s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:23
Static task
static1
Behavioral task
behavioral1
Sample
22d0b8be682923b8919db7a7c50fd637.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
22d0b8be682923b8919db7a7c50fd637.html
Resource
win10v2004-20231215-en
General
-
Target
22d0b8be682923b8919db7a7c50fd637.html
-
Size
6KB
-
MD5
22d0b8be682923b8919db7a7c50fd637
-
SHA1
06d91a0c4ff47d01881352252129f731b6fca3f3
-
SHA256
180e09851941a6349a37676fb8c3965e29de7c96fc100f30e83ad9d0cb73a51b
-
SHA512
1fa531c7c4f87c8564f4a485e26dc64b203c445b82b93521620c0315b6940cb9c723c2f5ece8b4cdf8ae2bede80e1fa086074e12eca5bffa7a72a66c8c875f67
-
SSDEEP
96:coXiozQwds/cHR+SKHOCoiLShZKEmI4dtACf9v6fLRGRLy7BUB:coX4o8cHQ/MiLdJIutACf9CL8RL2Y
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410581451" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26AF26F1-AB6D-11EE-9DE3-E6B549E8BD88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000ef24e7a049dabb85e252a8302effb2b350e475133973fc9e89d1ce2a40090ec7000000000e80000000020000200000006b1677210308f5d0c6e9edbabe22ddf4b84f339eb34175445f78f421851f791020000000086d90e7e7ad645a5bdf463b1daa8af4700618fa17d0ee8c3783666b5175b94c4000000035244dd8c365c7638f17dd803c55cec532c8aaded47f1a21fa1dc6c0bb7bee59de7326f306912e5817310e50344c6cecb5bb2cf54a9ad4218b52cc29bb952c5f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405e390b7a3fda01 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2352 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2724 iexplore.exe 2724 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2352 2724 iexplore.exe 17 PID 2724 wrote to memory of 2352 2724 iexplore.exe 17 PID 2724 wrote to memory of 2352 2724 iexplore.exe 17 PID 2724 wrote to memory of 2352 2724 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\22d0b8be682923b8919db7a7c50fd637.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD55e1474580358ee0042a4d88ff0091b2e
SHA188fc68b1c5194f20ab2ce19f0af8f0c4fee06d8e
SHA256966e069de2678b6daa33b75d13daab8c51b995375b5ce740cdf6945de7540a90
SHA512dd6f2dbf754a41b0825815e5b0d94492f549103fb3d9e7893042ed076a840c723c57363ecd80a6cc2a04aadfa7164b6f1366b75926a3fb3879f541800c4acc54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5648991bddc3fe3768c37ed1f3700584f
SHA1c1b52097c2795184a8ccb0eb772b56c1b824ff90
SHA25699c19de12c4af5af8a1f2a6bb0d63f574aaeeff8ba72a024f41faccc2e3a42b1
SHA5123a9971f6874549ed6879a36192dba107a3ee28fabcc18a5f5a443035168700febea907a4018b9ef3024c144860c8c30a933c0810e84ba5112822c3e2b7727f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54df7b4cd0d84a9a09d4f5ceae0bca3db
SHA1168f6064be3cf3f9f25cf9c6c796dcdb1f0ab97f
SHA256aa086937e6347876b7b2310e9b8ad408b453c3991690dd2af3b94a47c0c7163a
SHA512c1a9fffb2032c07bd712cc2e9905cade11037f08bbc31ae5fa039be5d8131d61bbbeec9e8594095dca3dbed49e069fcf34b3c5a7373e46e7a76371a693419d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519fb155c3e2f79e3d4ea389735e1f01d
SHA122e1bb48a9a28c3347d18d18965ca5c7dbcbdd17
SHA2566b38370783155586a051095e18883db5763682c56e85bc60bae095691d65fddd
SHA51244231799343f3186d2d983e07128b7df3ff47cc42bc0874e5fffb8417a1ea22f03d4f61c145fffdce5d045d1d5ea3df1c3fb69f9b348cddb243cdf87d81e11c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5965d7857236c05ae507a934fa6ca6550
SHA148d191772c9d048b69abe2e35940d58f21cc1e83
SHA25660147e5b882606dd5f45ab552c72f7785a3bd7b4c6579d53f6e9467f95bdaeea
SHA5127dba6bf655c126c74e0b869f50f25fce9738350393a12a64df585a22576d3e42355393974f9c0fd776a32722e6a05c3574aa3cb0af2a1b7eaac1948d171885b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3b06d59e2400cbffb2ad34cb580de89
SHA1b86ec9a9f091388fcc19d77e3b82fda218fd3f63
SHA2564c45a87331c61ab75e5429b194a0f27fa3a1394e886217261ccc481b229e180a
SHA5121e0cb773ad3a268fd414057dfc5fab29c9fbe14ed4dd960dbb521df822eb2f8767c885a717efe6fc58b0685a4b64003454723fb925a64a1eb04ac81555d9fb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc9a70ef594d296c9ae393e8b476a8fa
SHA17dd4701fde6426ef28c5a06b67f2dcb3c2ba6223
SHA25632c6f67af4ad90f89efc14d62846f9bcf36ebcff0548a24faea5ee6959df1fa0
SHA5121ce9463ef484f583c300df89ce7c133bf550e6e5317247ddf4b56cc3f40c0d0ce8d790c078626b1145ecc3b902498a9d0aadd2f873806e45dc721586d093afa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506192d536caa75e8febca325ad86026c
SHA1cd0871915f7b77046c88c3f5f29d5ffae0d575c1
SHA256cbe1ea58be06ff9fb6dcc30bce971eb49ed9bd95d78a322276d42f6e6e1939dc
SHA5123ef2d9c7935832adbc65c2a90205685a4e3ef3b9dd07362143a75a75c356058a8a8ce16847993ac0758a78c3573b4e235fd05432058e86d467cdd0856a29e7a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538347dde31f9faeaa714b27a0611e966
SHA12d4e5a82e51f302d07b1c5b4297a279291ecb94d
SHA256c857654d661d6f0da5ff22589588d3e62d9c7466af85d2f425fe5abca600e0ff
SHA512aa871588d58820b9733c92e0333ccbc72d9feb5fc93776c33a32129b003b72ca58d29d556c2584692a0bc5e2ae950c0708adb6765e1ea141e70e01524373e865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0c47431186bd687e417ae1ee4339b50
SHA150b18f0ce01b9e227a51444ff94d107c26085161
SHA25644a3e0d114fead511fa6c9ff6a1bf3fcb5d4c62eb676e695f08b6848d06a67e4
SHA51200c1c7200da7d5edafb21b55c916195124e0cd5fdbbf5bbc0003c963dc8ac6ccb004a0eb6dffeb3f94a8d45dc7fdae8984d3182a9a06b4416c2742f79e1d5bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581ec4649db238e9ace0ac18cc76b26bb
SHA12d38eff6539f4c1bc02908ed7bf790afa648729e
SHA25638e32503fb13a2994023fbdf989949a01b2f95f27c6c85145a49fcd2c3c220b1
SHA51208a5948fe43e0cf670934baa9ffb2d0ad2df1a39b749a00bc2f547c5c16e7eb383b4d3eeb6da49043dbdfc731df472d4e7a0dd985dc50f0b784171670ec6617e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51e032825f840dca1bcb7aa4d816ec42e
SHA14a0d11abe26248dd319fdeef7add834e0e80d673
SHA2566d50b4d202595039c807fec4a248ca4f773e17dba8cbcc9b151050d0344aaeb9
SHA51277c6f5d7cd22276bd1807b6d9d2934fcf8fb8a4bb4b395adaee42c5ba914a29f55669e1448eb09c759d23d34f8aced82c435ca643050e48376808b290eef7e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1J3COEF0\px[1].js
Filesize346B
MD5f84f931c0dd37448e03f0dabf4e4ca9f
SHA19c2c50edcf576453ccc07bf65668bd23c76e8663
SHA2565c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584
SHA512afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06