Analysis
-
max time kernel
65s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:00
Static task
static1
Behavioral task
behavioral1
Sample
23aaf5af5778cc13c79a4aa67741d7f5.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23aaf5af5778cc13c79a4aa67741d7f5.html
Resource
win10v2004-20231215-en
General
-
Target
23aaf5af5778cc13c79a4aa67741d7f5.html
-
Size
25KB
-
MD5
23aaf5af5778cc13c79a4aa67741d7f5
-
SHA1
29f59520a9e66cbb0f4f388511c93ee0270441b4
-
SHA256
2f361065094a4110705680e4bed1dadb261f991b4f105fed18339d22f8e73640
-
SHA512
92742625cf66d7b3672b8abc8cfb145d0a8f50651c421d50732f11c91ec72b77f2eb75fa353c67ac13d969a4bbb76c283d010ceb6e83a8d868df3462369121e9
-
SSDEEP
768:xy1R1DeCUOS1jBDHhEfh6XYammV77OfLv:xy1R1XU31jBDHhEfwXYammV77Oj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000002aaa1483509897bfc2bb16af2aee31d9e5337395ad8700a1592b5437155aa81f000000000e80000000020000200000008d532b0c081bf8d51e3ba708aab2e8abea698185b53aa2dfd452c4bad1bd339d20000000159f9d0dfbc97583f3f0f903fea3ec9baa45e569c70eea75ab93396ed93df3fb4000000089f5f7dcc26da3fc9135ef655bdb51859903cdcfaaaf14822f9cdb2d896aea461d232eff0a1fe76497c2c5992fc0ba1bd720228a43cd0c87c61725fba059c62f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8034e338873fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64599B91-AB7A-11EE-9905-C2500A176F17} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3044 3004 iexplore.exe 28 PID 3004 wrote to memory of 3044 3004 iexplore.exe 28 PID 3004 wrote to memory of 3044 3004 iexplore.exe 28 PID 3004 wrote to memory of 3044 3004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23aaf5af5778cc13c79a4aa67741d7f5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55982306bf9b6b8c98dc75117a08201f8
SHA1255b82c55d54e23a02ae73fabec7d8e22c0c6ee1
SHA256be0ef91da86cb6cb9286a79736c1aa88ff9fd93293044eae70e4f517dbb93d6c
SHA5126f87b3ce9ca2252ddaa3c7340c06f448bd7fa2a22748f53e726b931ab69e111d7ff320d2e6ac71fe151f4a6006c45456bc5aab7921864c245730d33c0551f298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a34d8594e2e5b2ea611a4574763c2244
SHA1ea316fa06f627a90b1cedac347bb551bf847cd47
SHA25695bf09a5e1f6a242c81f96e3b3ed3f3acfd91800f5b378c06ea946fcb38ab525
SHA51213ae350d7cbab4ce90c15741e3178907b193a124d47f54a9d108a98ef4f8f96d3cc5d7a91f252c8b12937153f1b832c7f060cc46a8cd427957adea02ca1c38ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5a613420217d5244834d03532c5e1ce
SHA1809bc174899ae05069f4995916c14d9e476e378a
SHA256c49b506e99887d7e478b32e34ce00c43ccb62f495abbb649fe02eb78bb7ab465
SHA512772c9fc35538e331e3e156b339022856b91911d9f6a74a8ca9b4a351edf0d11492b9008841992378eac00277a95cb3076bfbf9942242ab6ccd412d87878ce8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5536dd31454b672b757909052e84ba9ec
SHA1ad64db68c05c9dec04b41a6a27104b36d426e107
SHA256e3cc213bc4d1d04aa084b31e26a7e7fd80adaf298d92bdd6fbdb05f9e8652b8a
SHA512ecd0e3815838a3d27faa392b743d1391408cb7473d2ae656779eb42f5ceb6e5f79410d6c8b77ba5d2ff40dded1efee690eca353b5e9a4f51d153491e3e67a00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500a69cd1a91cbc6ae35406b370d6b4a3
SHA1e344d68f9e75d77eef80e9e10ce384a0f470104a
SHA2563a5120945474244dee5be037971647488a18549444cc7e332a644942d9099eb2
SHA512518480f6559e9d2700be96b162e465637efad2d569bbde13c4feb2fb8115fdaf0bfecafb8feb60008df3c089ed8d924ab1223a9845799811d9c00cb0754cee62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5703ee3f98f90dbebde8e6a1a7571ecad
SHA1e9bddf61161c4fc14a219a087784fd062297fde6
SHA2563fe3e2a6da5d82d3029359ae8e3482c72430e213a6d202fb748ce896a33c108f
SHA5120709f19ebf6b018ba51ed0edd6e361963b14d91383eb0be8c63ce937a2162693b6045ac1f9734c78018c1c6939720a9d6251c59b6789d8eced74f133885e6dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebf53ee046d4fa3b1f3b21b542420128
SHA1851ce295e79d312776c97996723314b60b776024
SHA256f553e6ff8cd56ea0331cd842cabe3de10ad355187e6a6781ee71f4ebe925fac5
SHA512f682e6a65d7b9911cb94b825ae9053480bdb54b7182948e0c06576181162e35c715e9bd94ba343faac6a8cff0521b3e37f7b8e8f15662aab658afd395b9d416a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06