Analysis
-
max time kernel
140s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
2539387bd6d76fd51a274f2d9ff000fd.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2539387bd6d76fd51a274f2d9ff000fd.html
Resource
win10v2004-20231215-en
General
-
Target
2539387bd6d76fd51a274f2d9ff000fd.html
-
Size
9KB
-
MD5
2539387bd6d76fd51a274f2d9ff000fd
-
SHA1
0b0a05ceaac15e74e5bf2eb3b255cbb4ef9412a8
-
SHA256
e84e7678f62b06bdaedd555c0a72176962a50c30c1c35bc7f79bc324b5bd6268
-
SHA512
6ee8dbd39b2abd50724ca4b8fae75b4610b7df02f6809db079d2373a1fa733aafb51190b56404a3aa026e0b3adec23194f61f6147c086dc86fc4d00b7b504d91
-
SSDEEP
96:uzVs+ux7BH2LLY1k9o84d12ef7CSTUyGT/kPs3pUlVHcEZ7ru7f:csz7BH2AYS/HuUPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000a2cc2dfd2aec89e6dfc8453b304fefd0f08d1da39ba23c4159981d6099fb588c000000000e80000000020000200000006f640f151d7ebb81c6c7e29bf2dc47761e2ac3bcefa243d1aaa75056e4e1a58f20000000b5674caca0e6d3a67a88ae250189939dfea848bf869d07b435f0dd120c62e0e240000000b14660f489358c743ba811308a7b98ad26ef3ea91ee7ae2295f0afa6e73f6175718071996892312ff36fe5134baf1b0ada9e182059a0ee6ab537fe61af8d9843 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90140092143dda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410317989" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BACCEF11-A907-11EE-88BA-CA8D9A91D956} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e9178664000000000200000000001066000000010000200000007bb94ad67a1c96c2b514d95796d64446d8c422b05eb43b74ca4b20ea35eb3e35000000000e8000000002000020000000aca6bd29eb3312d5c0e66bfa1462f2ab9baac3e4661e8f61988bb799e36912b090000000d3379790827b2b9c9a9df1439385039b95cbc0d480da07e6aa0fcdd12378108d13f539cb50ca94eef24d6f3f24feb075a90ec126b66cd69533486dc3da272b54fa3258fc794cd39b766c0f833dc41cdba42bd7ef18dc4a84bb9bd3d1c1d9316ce60f9822292fa9460a4ce0fb973946e9fa888eba4ff9f34645afd35fb9d6945cd6a3a475d3782a27330def64dece009640000000834bd9fb345aa5ae1c93b2786660372e3ad6e6733e1d0748a96e9440e994238c945610fb6f52dad363495e7cd8994e7765182b4697d95d3e531017dd8883ca64 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2324 2540 iexplore.exe 28 PID 2540 wrote to memory of 2324 2540 iexplore.exe 28 PID 2540 wrote to memory of 2324 2540 iexplore.exe 28 PID 2540 wrote to memory of 2324 2540 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2539387bd6d76fd51a274f2d9ff000fd.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2452684d8a8cad296ae991e8c56a409
SHA16e27886698d2cac79a7b5ad2f5cab4fe662e8c2d
SHA256392099474847d38fd8ceae14c87bbb0f524c4f9cd2f18bf218a70b6dc372e9bb
SHA5121984b82058c5275fd2d0035bf3f3bc221ae3fea39e5718280b68f9497cd12375128a9b23e73e5a853dd7c21ad868fc4f82b773d691417b8ca6fd46b1a52d7aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f35ca8e07012a5e0a6bd6002de957c14
SHA10010eadcdfeee6cf19c58b11800b0954b3ea59c0
SHA256cc5cc365782f301db0523ad9d984e0a8e2960017691a885c11df2b34a4196264
SHA512960466c3db374b009d8dde1a66245567a37b6cda92e580f9d29dcc376cc6345f00e6b53e7fd52d148ce1a746a4652a4e836fb372760cd5ec18176925851f8347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b49bf4a69a323f87e581c340f2f87844
SHA141479cbc732d5b8ac6b0f28f650ec3902d3332ff
SHA2566d153db0311b984f03846143e0b84189f47880ce99edac015e1dd84b5bee3eac
SHA512e8b8e4b860f7dbf90e3bdb5b48410d53c1927b4ae09e80cb08635ee254bd9f81bded438dbb17432a811d1032852fc005df59f66b2827776d748db7f0c22178a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a4b6fe84f4215542a53afc4129a6737
SHA1caa24599f3040cccad60096ee41dcbbb512825eb
SHA256fbfe9e67101be337462f04f033770f45498ca553fb017801c49e312b6a7a3110
SHA512d6055f77f6aa7ad545c98efc3ff1583f91a9833e76dfca1ea386ed00d06a1839bcf2960fccd865c0706f1d3fc08ac345bce03620a02eabd8b24d5df38fa79731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544c7c66a4c436f4ff106f8a2c80342e5
SHA1118d6891ccd09b3ac1bd2011b3cde2962e0ebd78
SHA256fc0800cc14efba11ae2c7d85681923edde5c2139aa0efe6bce406c60e4bd43c8
SHA5121ee036282ae572bfa63307a7f3442b99edc6591d88448d28521e43c9f4b35c7ec46454dcb0faaf772fb14c43413b9d600e17e3f5b41101306165a4501a27bd87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579d31d82b9f7b69bb50035b8fc3be584
SHA1af1b6fac4f572d4419ffd5fbfbe3f0c2d8962403
SHA256523027ca39107274df01f263f367dafbac6d881fa2268926bd6d58fb6b2d31f5
SHA5121d243de37702dd8b46512702ef833af951ddfcfc7e3facd7640885cef5d3f911c435595a4f1a1c6bfd472294505e8e5dfc4246121e48182ae11703f55df92fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f87b29e0a9d3e53a39a088c346f1f26
SHA1fcb6c87ad5a0e4bbc3190d04afe406cdcb48d9c9
SHA2568b5b09218ba88aac759ff769892e9a05cd7c839a00a7db3945955338c98e0df6
SHA5129a7351715ac30f78a99572dcc28f25f43d27cecf39ee6fb075ed96269f7a8288c67bcb8c122256487980db96ad2e2458b11d26cccc26cc88700b92da38d02ac2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06