Analysis
-
max time kernel
14s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
25e00589c0f9a7e7ef462f71b23b25c5.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
25e00589c0f9a7e7ef462f71b23b25c5.html
Resource
win10v2004-20231215-en
General
-
Target
25e00589c0f9a7e7ef462f71b23b25c5.html
-
Size
430B
-
MD5
25e00589c0f9a7e7ef462f71b23b25c5
-
SHA1
9df44e1870d886a75631971d7ec0474acf53424a
-
SHA256
f0e28226cf742402ec86a927559052bfb1568a2ec9baf8898b17ad41f8009b8a
-
SHA512
7e5906101138c49d6066b4fe210a1c35807be611bdbf73bc0700a41684eb326ed0c273ec8aa97569865b506eff5291038d8e40b6e65464b6bb2afd1bf222475b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BAD481E1-A910-11EE-9066-F6F8CE09FCD4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b4b0841d3dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000b51d09d59a1f9f6d845f661aa0af37672212f13435ee0f504058f2341d76dc62000000000e8000000002000020000000688a56d32587cf4d7e03c155b872c819af4f1b416639c6de1343061a7415cfd1200000008d9f78d8bb0f5d984515a4a53b94b566a60b235fc7f2de252ea00e2b7f7f544a40000000c5b2e41bcf06d4349dc74a46f6e848fe0c33dff82b18beb36856bfe0b0a26b64029392d35774b75c8418b234db88568da56cc9e23264cb702492623e49bd3a5b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2156 2152 iexplore.exe 16 PID 2152 wrote to memory of 2156 2152 iexplore.exe 16 PID 2152 wrote to memory of 2156 2152 iexplore.exe 16 PID 2152 wrote to memory of 2156 2152 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25e00589c0f9a7e7ef462f71b23b25c5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580ba9c2040376e73a61c37a253b58252
SHA118ac5b6662ad680702a5e71ec2a3d115c03118b7
SHA256796951cec5a26020f0060e4bd1f9e1d792887e58566d9b1b60339ed8ffe98152
SHA512799a644e7adff756cd4250be393efa859bb46dec898eaf9b69e6deae9304e91dd96aa496fb0b5bb4fdbc55e7e36ed49757fbff0a344c1e6e6724b6741c1b592a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52767f69af581a99ad4ad4210a01747ab
SHA1fedaba0f6bc3fbbf390e66d19768460110b083da
SHA2562c2932fac8ac7cadc2386207f7e98c088a8f290757f55448c57ea1ab846a134b
SHA512dbe0adeabd12fc55a405ac633094bc50db1c1249340d9c188ee72e37fa86171e2c2522695b0000b1b42f3b18df2832ec21a6a76644d5157e3c4e3fab9a587dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528f82463de3065670000e40929eaab66
SHA1672b6b92cb0c2cb0eee60e5c4ab5eff4d1a56210
SHA256b2b5fe6ea8124637f9db33a63e642aed578d8a35e13c5e46c54a9c975bbda2bc
SHA512523a5047fcb721e4bf1180df8c894ad2ce7df35155ee5c1172208a91517e6103a9b23c5ed5fb8820b079a7c7a7d30bca47b6a13707cad0fff16437f54c657aaa