Analysis
-
max time kernel
136s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:37
Static task
static1
Behavioral task
behavioral1
Sample
28724a071440d94195543ce1eb62a7f0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28724a071440d94195543ce1eb62a7f0.html
Resource
win10v2004-20231222-en
General
-
Target
28724a071440d94195543ce1eb62a7f0.html
-
Size
25KB
-
MD5
28724a071440d94195543ce1eb62a7f0
-
SHA1
7c5686ded6b0afc75197e6300ee60bafd667e513
-
SHA256
334481274541895e177516a93be9cd0e47e63e35ea6fb190c453f24b1dcdaf03
-
SHA512
de2aa40a5d64c1b80a773e6b8f87194d7b39b8f189c395f1c3b268c33b729ed552ba6fc3217498edc276a2cf64faa2b8c5fa033fd97f7848448e31a45cb3193b
-
SSDEEP
384:+dg2H8o6zGwi75JOUtxKTeBfKTp936j9YN9LgWQQ/U4yhoy7jfIWrYc51IlSAuVS:Ig2Hl6zUltITe0HKZWNG9p6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA99C081-A931-11EE-9673-F6BE0C79E4FA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd769173341890000000002000000000010660000000100002000000004019920cf9d14150700e8aa7b9dc9b5c42b573ab35a81d04a12b655c9b89875000000000e800000000200002000000067c24d01e65c35608c6d2cf864657a9f841e24b9d5cff67afa0b75676c0f1d302000000018eee4881c134c75f62abd48a0a2573627f3633c0b1d4dbf98f1617ca1c32da140000000d4d3dbea85438ed44e7332c4beb11810e0baf924120c0a90b82b1ae1b3622428204b11ac63ac9d66bb705ef45538177a32d0fe2f536827c3ab93a806a07255f2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701a66d03e3dda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410336134" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2704 2480 iexplore.exe 28 PID 2480 wrote to memory of 2704 2480 iexplore.exe 28 PID 2480 wrote to memory of 2704 2480 iexplore.exe 28 PID 2480 wrote to memory of 2704 2480 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28724a071440d94195543ce1eb62a7f0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff5a9a206f038047f6eb533dd7e00208
SHA1735131aef1d7076786aab226b031eb3cb5a9886c
SHA256397755b900885e680c63d0f9220c5b079b852a77afb00a44fe5db17f6620396f
SHA512989b6b980246d639d1918e58fe0057c8972a01760751c6292c41fe89a1f5fd38ffcf13d8cd96c89bbbdca833607172edf34ee342f55d2400f202a01bedc3aea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e63a4d9756673e3c91d1dccd9ed3062
SHA10bff97575c725e4d7dad79fcae306287da900541
SHA2561b9c30e5d3a79debd8393beac81369eae2c6ab591a9571dc622a6e0e165c190a
SHA5128b855a0046d7f19d60fa230675817cfee29dab555691223c93cd22db3566b88f82362b556f0fc56690845843b73a7e36b904d82c168231154f57b10a86a0e12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f819a3b631a8b9d731a4172da9754a4
SHA19a864baab7efa19771736b5be273d1b391673cc4
SHA25668cb73d0643134bdb8d562b0732eb08d56209d2c714dd72da615786e27ff18d5
SHA5120d42972fcbc37f416554aab27cec82c9faf0225021d4550285b3dee94855ad0d1a5289f70ded03b26462b064363a84a788b10d6931257cb8d7bbac5cf1df0722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4f689a14314c1c422ffa3bded3866f8
SHA17b2b14262d5da1140c45b8b34e56aa56fc65ef66
SHA2560c2ffdebc659030d3e7e3e863a5abb0e85bf0c66e66561836a501f186d2a3ede
SHA512568df7479a79460c586c494047564c893834b08dea31470c087002948bb317bd99a2474221d40082c8f2ab6bcb5a7524bb9f038b408d48fcf6ba643805525a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b48f81aacb9672ab8275d37fb38276af
SHA16644ed9ce4c95e140d798779f493840386222475
SHA256bba13e79e3b1407f9b3c8683431fede9dd442ead4669dd8d4d573a696c7e56e4
SHA51281224e9ae308e37e846ddb5c11dc856c587ce60c424665682ef31018db262b3752e76bc1fe8c0ea6f60a4f3ea9a26de2d4e18262d701019f4e1f3f3e85cc6571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542945fbb6a661da3f507b242e17148da
SHA1da566f28158ce9fd379c7ff964a70f2b218f5876
SHA256843df08b5b3f35b3dfb60535f2548cf32deb94136eb26f681b432d568bcefde3
SHA5124432c7e13c54ee7e75a12f51f8972ec4941a3bbffa238a0e0bfcb12b142a9a1be10af44da11981d676c791d4d7b0a54dd0524dabe2d0825f8c55bfa67cb0b51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1a1157ed9587430312249135986a170
SHA12ec041ad3ee1280ba99083464deaff5a4174729e
SHA25612d4faf987f2ce383e70744dafef1b1514697ed01edafb2503ebb40a4ff8a930
SHA51281e3c5d9496c6adfc4a424517c36c7cb3046ccda263aadc49b605f6b1ab3628f5f30e9bf7ce3a6b65aa670e115978b561e5310ab910af2ae974e43d643a24022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba8249305ee7c6a68a4b9fb31628c1b1
SHA171ccce61584ca2657efa7179084784a3e4fddd74
SHA256b2c19c1800814e0392291c67177a52cb89a8eeb745f7e1b6beab6342605305d1
SHA512b51ba2028b146136662466f71de38cba3bd77437c2bfe2ad2d5054e9ce09544dcd4a95353ba9088c3e6e3b318913100a32497fe243fb3b52564ba207153876eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ecfcb4d3eba48445e2ef41dffed9c43
SHA142995c226045f6d94a98553f2a0104898528189d
SHA256eb7e110469a6cb14da09c7bc5ab6f835c4b1baa38afc179e02b6969bfb286d08
SHA512ebeac251c793838cfdde5c6870466e3908e5c20cd4fb21e2d8b246e4f23e9b052bd141c9cd3e35fdfe6e2ce281a286eaa31574e5ee8bfcfb4387c575c55a0bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580170ded62610c56db5de1561368e9a3
SHA1cf24a0e09d4f48a11afbc80010c05dfafe86bd5c
SHA25635c8ab746bac8251dbde888c415d24d5d1cda65f213543c011871de6310f7ba0
SHA51272f4d99e877f336c2faa79be8bab621e52310219a2f10bbcd78b68d0be5f1d4043c1ece3d047c4bf4d8fb0946b1be6d87b6ada9bca40a46779dc2c7ee4b9498e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50404251266cf4f0b8bbb65646e1acadd
SHA1cebcae777a68043cc4ff0684acf108eb134e610e
SHA25629f3a9a08654c44e93d8d700fd92910c279a9276b1d4e223fb049108a40dce78
SHA51297c246e29c8e97d3a9c734cb499025f3018ac5ffa55ab1a8b65948950c0d584cd3ae392e41a7d1075885b549e86789f851c64c57a5532b4210c3418efaf7b49b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5620d76dea3adb4c597640d77da008703
SHA1c26e43ace76a5f6b7293c7302176425f20f40d4c
SHA2560677d32c7b6d648bc0c119dc08d37b92a346be84646f399e7f3050327629e3cf
SHA5129cf4c05fe3e2dda7128014223856c8f2438e584f970ddad716574fa7a0d19d8a6b2b02617330ada9578beb9baae0ae90aa826476ab76528ebe95f3e325337f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543187e1be9f35b6ad0ac54d064c9d7e3
SHA135ab84018dd1c88d7dd38b1952b5e7ef0180b585
SHA256c8d42ccc0c3a763aab4ae3545c847f1652edccd9ab190e0c0c4b2d0ff6035a39
SHA5128a0cf24f3cedc899906f31e92de4b7623528061c46ec7bc0ce7ed6e2c1854307e2f5b2a7f02efc06994d551bb40d90300d7e32750fad13f152545d2bc205fae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e02640e1219158115648205734f403d2
SHA131102cc1838ac5cb62ca8c762df1cf931aff94cc
SHA256d3e4f1aa37c5f6c325866157bbf33f830f79f28005aea3fc62b92ec9753e0539
SHA512d4cf4f309a0986b1d955c837c289dab3cb2e63c58db900657f459b0468f189d2995a817e262b846a691f3d4e0c0fe69496d8833358dbed433bb92668fd3c922f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50292d8887fa86cc3e79cd7afc39c6db4
SHA188a4a75bbd58bddeca814e82e2072190e22be924
SHA256b239527b18c8919302b46404a289adb8cfce94427a470f1a4eed83a993216c83
SHA512e67f1c8775445d92799579cbb813d56c3f1cb1ef31c6f6fb888c8c021a15e555d1856154598b75eec299067f6d89594f06c5c11472c9798296922618ebbb0635
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06