Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
29f58dd38c0478daf1df83cff2815104.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29f58dd38c0478daf1df83cff2815104.html
Resource
win10v2004-20231215-en
General
-
Target
29f58dd38c0478daf1df83cff2815104.html
-
Size
40KB
-
MD5
29f58dd38c0478daf1df83cff2815104
-
SHA1
89ce10865f60a152685f04dcac5aff575bfe0da8
-
SHA256
30fe2a250cf5bd0343d2ee2fb75941dddf04123d42ff239526ac07be769c6d3b
-
SHA512
1014d6d8321e04a3b577056e74d7a188d1a3efdad305de4a49864f87f1838ae028d625e9f63346c124b363b8c3c3186efea0454c8cae9a053b6d568e66a2032c
-
SSDEEP
768:gIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZUvV:gIRIOITIwIgIiKZgNDfIwIGI5IVJ7Sqn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000000887181490dc5a52c4389ba51a5b0831f98de0803040238dc4a9b119ebb70039000000000e80000000020000200000008f922d243dee224d6d719ea4598ef74307e7f3b920ca0a4aace760e464617eca200000002964a2cb8616421754c06d5b166ac6268c493f628747b61973abedbce2a6d2dc40000000691163cb9eb4d389c4b32a60c9da87cac0f62043c608c77ea25f086f4d905e33bdaecc72a5c72bd0959c37706bbc05fab58469aad7206b50f95d858b46a5c64f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410633428" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2988A991-ABE6-11EE-BA23-F2B23B8A8DD7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c54801f33fda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 1348 IEXPLORE.EXE 1348 IEXPLORE.EXE 1348 IEXPLORE.EXE 1348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 1348 2964 iexplore.exe 28 PID 2964 wrote to memory of 1348 2964 iexplore.exe 28 PID 2964 wrote to memory of 1348 2964 iexplore.exe 28 PID 2964 wrote to memory of 1348 2964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29f58dd38c0478daf1df83cff2815104.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bac866566aa99753544263fe404106a0
SHA1c60b7feb7c1e4f18fdfab9b7892e5003bbbd05b6
SHA2564dc023561d37cf18dde914f36bad17af44d007c8a9e8909dc993ef7b06559b19
SHA5123bbc99025b2dd25d5b5f25c4aa7a812f823b390eb668c62f3f5d067b87c3fc2245010097974608ca5d2e507b061799eb93789927c7be8cfd39d19dfbdd16ed82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c93924a3ae7f3b0108db685be5d4e9c0
SHA16beed27322a5e945e516d66a546b0ffd8ab5de80
SHA2569db3c81b701d3681d97d7fa08edd6d6de4507afdc8667f7ec0b896433517cc10
SHA512099e212054d75259c3128d5b977ea35110e11ca9a98c83a8a16a3eb03a94ca9efdd7329835232a1b8410f1efe683602a0372e891aba7ea682116d509fb77e25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5971fa61b1c1c128022b59de936e49b0d
SHA152486a2a9674112d2253c843d3891521704552c5
SHA2566c4fefd6583cab00f3c11142b53d1fcd8d73053b775bf6d86a101dee55bf7281
SHA51270e9aa9dbdd6c5ff07eab409be467559955263fb774ee1d0271613b89c501be98099470a693743f0c4ed1fc03c6d8b75a273c1462a1998a503a96362f7465a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb23c570b3a4f57fd4dffa4961f711fd
SHA1d355c31800447f20c4006214ec3ea0f1478adfc3
SHA25624f81e19d35c8037e3f1502471007411da6b019b1c616a8565da736596a1567e
SHA5125d13966491b4e7244fc38bd3247a8e68322220bf152808b6f6fd868929f6a21fbbb70658f61bf4c9289fdb527b826cd89bb4c9a7592d6e74b28f921fa1c98bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57336e6928b9cfbc4929f89698144faab
SHA15c4bade7aaaaac65130c0f7e19d930a3b9e38a8a
SHA2566748a1a293abd6ab491cd3c4f49fc72cb5504e76e0fc48e9c7149ab3fd51e9cb
SHA5125d02fb31ae0b67eb7c3bb16087fe2729999bf053704240fa34481aa55e8508d6210ea7dbaf77b0c9426adc27251c899f95303f82a688cef59fff10915aa6c4ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1af4375bbaf41a738dd5b018fc252d4
SHA175661dd3d9d4391fb49bf6e571a5813669bbcd27
SHA256f74b57d9beeca1edae53caf1fbea224923e8757264927e049a1d757f70c20f33
SHA5124337f4e62bf162ba65eda5c6b7ee55c2b18850b2049144cfd100cdafbc7b5e25567a1c52f30547ffc46c935baf6634d0e1f73609f2f1d7287f3e23d9498d9126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593b10143ed7eaa91766345bf9e6e2d86
SHA11d41d5ef16807a6c738cabea7033ba05a17d0056
SHA25686f709ec26bd9b2d95f247b98730ce42243eb33ced8a32ccde775907e2bb2178
SHA512c7a46d9e8209d102e16c1a7fe7309e12f030da417734b43b4a37dfbca68219ad7405caa8250e109e04ed1ccb46d457d14f3f741d4920f749af7f123d520b5192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5195caad8830804a62c7a7b72b965b8ad
SHA17dbe4a59697a9c56b81f5cd77397008887ff3e99
SHA2568e0645c40e8c55f612e8d0cbc55ec39373a1966d38548e144d56af638966f3a6
SHA5121dbca6859d06087e92c817bb0f3f9a4a34250097b653e7ac55fbfda72b5dff391ada828e4b4cbe46a732d26ba0146c7273d149abd01e823e7c4ddee276b3b65a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4412064dd824933681fb563549e9cf4
SHA10c65d38d6b99b46d2fee783453754e6aa249e012
SHA256454ea09decbbc7804aade6b5c72bf843a8cd480292c37cfc3932d274d0698d8f
SHA5123e65fabb530769a063ce326a324bdb459d0af4fc0b6dc6380f38d8006d19fe3e562e522747f257734ddd8d637f88fc377029daa8974dbfe5e27868babd9acf59
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06