Analysis
-
max time kernel
0s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:21
Static task
static1
Behavioral task
behavioral1
Sample
24573957e2ddd611ce40e52bbc621b81.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
24573957e2ddd611ce40e52bbc621b81.html
Resource
win10v2004-20231215-en
General
-
Target
24573957e2ddd611ce40e52bbc621b81.html
-
Size
53KB
-
MD5
24573957e2ddd611ce40e52bbc621b81
-
SHA1
c935850b291f2790161828026970dc5cd2258375
-
SHA256
dd563113e67081ad28ec12c52baec6b80bc9da39732a2bb71835a8e40dedb6c0
-
SHA512
667a5d916faf59b3484e6267413074628268a809f393c7577a273b18ee0c61074dfdcf9c1f2f8876f2c8a188d4d6ef44ef0f29b74cb977b63bc1705a4078f77a
-
SSDEEP
1536:CkgUiIakTqGivi+PyUprunlY063Nj+q5Vy0R0w2AzTICbbgoh/t9M/dNwIUTDmDh:CkgUiIakTqGivi+PyUprunlY063Nj+qc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73297CC1-A8F6-11EE-BD3E-4EA2EAC189B7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2552 2996 iexplore.exe 16 PID 2996 wrote to memory of 2552 2996 iexplore.exe 16 PID 2996 wrote to memory of 2552 2996 iexplore.exe 16 PID 2996 wrote to memory of 2552 2996 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24573957e2ddd611ce40e52bbc621b81.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:22⤵PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c9a0fe78f4754d53c622edb7052668c9
SHA100682fc2b3c0b9b8ea242d8cfbc170cc4e467d1e
SHA25664bb9b667071efbe5586865f670816a9b452bafa0c989f978780a697de975fd5
SHA512ab02d2545c7531900ae58ae3ec0026954f05b34ff63f96f650846b5320fff8217ac13a8ffa7da1d3d6d768ae9707d0f783001adb391759569fcd865ad3572ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e2f0c902e2c30061567463052ac3451
SHA132d92184609a30f252fbb6dfe6faed046429a161
SHA256866bc4e80bf2a54d70127e30a03b6dad372dfe6ec100b22fc31195eb39e8fbd2
SHA512f7a880aadcedcbe2bc2fa237aa6ecc3cf5936a35f3c0eb7d80f9310c93f9c3ba10a27de93806c41c6d6f2ae01a6ca59df45b7dd12d122470d15e481f630a3661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c233fca5cde923c40acd2984f3d54e1
SHA1d50810c7c71962e59345270b5eb7353be2d1d6c2
SHA256dcfdeac1d3e8e2bf25a9d65e774cf3c930249f007af010740b4162bd079e4223
SHA5121f07ccb5791cf85d2b59ac3218fb02be584329f8d860bc25efddb219481c87c572c03cafb4d01cda75baf9ab08afb2fd4a9f9e82311660d24619ae2960e53a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574403886b2c45171e4f18b755eb63780
SHA1167c487a67a8b2c6cccb710754acf5be4460ca58
SHA256710f5f556c505db8213f2b1b31cf389d7782b0acd47e7a9428b2d8099f3ffbf9
SHA51259884a5f32249a0eed5e90fa16ed1c52edeb13f11bac5bb864f4e55b3e5873bbe81dfb3aa4e344e18f4d5a45acda002444a3d179cd71d016a987f646ee089986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e