Analysis
-
max time kernel
7s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:03
Static task
static1
Behavioral task
behavioral1
Sample
275b05a6208e70bb65deeb897496a68b.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
275b05a6208e70bb65deeb897496a68b.html
Resource
win10v2004-20231215-en
General
-
Target
275b05a6208e70bb65deeb897496a68b.html
-
Size
3.5MB
-
MD5
275b05a6208e70bb65deeb897496a68b
-
SHA1
af9043e124e18d485ee6785d479fc859e521b52a
-
SHA256
d0a0fcb59ad1a2c079019aaeb9bebacaa8cf0aea3b0f8e5e19f8f6fba0efbbfa
-
SHA512
24b854bb440f4ff4fe6372bb4e3ec9c9744bfd6ff03256f94ba509daf5e8ab02284055be077fe83294b41b88e407f4bb2cc7acb7ff21b0be3a7a01c5d7bc35d3
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nuj:jvpjte4tT6sj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67F5B9D1-A924-11EE-8A35-62DD1C0ECF51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2756 2352 iexplore.exe 17 PID 2352 wrote to memory of 2756 2352 iexplore.exe 17 PID 2352 wrote to memory of 2756 2352 iexplore.exe 17 PID 2352 wrote to memory of 2756 2352 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\275b05a6208e70bb65deeb897496a68b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514d58909296c5370fce7341bd7b62257
SHA17daf56ae7ec86b0093a993b169ac04327501b15f
SHA2560b3f38b0b5337c8e56d67f6a76ca501f54a1ea148f849d422159ee8b8e56210e
SHA51260ad2e17961ef7aade37ce083508144d2ae8a3109ba317b890f557aa4e01cdf88545ae1b183d468595381c3c7adc7de9b37ac9483fcd518adfe926de17a3900b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a1952b7663e5e4825fe7c463e20a856
SHA1a99e8fd2916ffc9ba5f2650c36d29222d0357946
SHA256caffede5c1352946347a24282419059dbc742c4d2c32073664e6a2314b3ade3d
SHA512e551eebad6f528dca1fbf8bf6050f9f9b5f4aa994f8e8180672a21c3b48b10dd0e442fe9f77561e62d011b71152872f4935c76ba627fd46040a8898796c9b636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8149178d38bb4693af4e378b26a135c
SHA175ceb6fbbb6b28c263a3f8ae65d6b50ea6d1deaa
SHA256522f435e18dc47747051b9fa5980300566d0489c1a841d7cf667be94996f3f16
SHA5129165567cffc2f5f53fff68321199334441eda951840259840c414baa09137a3a77f344cbc482e06f6a8ba0bbb37011ee2674b26c192c40122c48d0c994c41d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b05254b6e6aa594196ca488538411ab2
SHA17daeb418947b57e9ab4061352f382d8d3f7f962b
SHA25650968ad3f454cf40d3cd836ec2c5987043368171c02b172b29893d499481d437
SHA5125d97bc8bdc2ebd2f6c42fe9538f595bc7a6c11cf10f1bdea725dbcb25028f0ef7fcfcd64552b370754a350ddb1d8a0e187efedda38c77762e1a90adc005f5f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff29153c980b153aa1516ccb1249a696
SHA132a4318740ce2c9f9aecff9ee0268ef4219f881f
SHA2566bcf148526681d7a8dbb64190ba6c4545e78f41f62643c7647e15c15a5e64294
SHA512b0c21faf3e5dde17f7ee190c98308af6638658603029e50cb54209e0dd734cc6b0370c1e11622999de2e05f94cb352ecae8c85922b5294a3f48766ed5f64eccd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06