Analysis
-
max time kernel
128s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
28c67a8ce5fb0306d0ef8d7e2fdbb21a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28c67a8ce5fb0306d0ef8d7e2fdbb21a.html
Resource
win10v2004-20231215-en
General
-
Target
28c67a8ce5fb0306d0ef8d7e2fdbb21a.html
-
Size
153KB
-
MD5
28c67a8ce5fb0306d0ef8d7e2fdbb21a
-
SHA1
2861ce79fa69f2d216dea7750f7f953e58650a04
-
SHA256
3b5a700dff8d7ce7c64347878f045b2d35421941b6bce73e3d3a6e0d66e0a93f
-
SHA512
bc68bf60a23cf7d94228219f0cfe526e9644bacb3eef42b7c004d2f3e191ed0594c9314cbde0eb5778b5bddd17ce454e5afb58514a3ca5da4f1506d43fd49736
-
SSDEEP
3072:2PVBTkZqkg3l/X94itXQFOmncnM/CGFtqfPLt3Bl/GQktItPL71K6jm/Uozs7tcf:2PPTkZqkg3l/X94itXxmncnM/CGFtqbG
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000c482a5c341ebad43aade5a0743bf51c9504ed8ec9eb926454fe360fbc4c05e69000000000e8000000002000020000000ee7224baca695c0f8c68a78b8c7165ae56d630c107e5365fa55e88ceef265b5d200000000c212c4df452681f53170c46cf2281ca112afb58af2a4f8ab56385d4c28a11de40000000f516678918d798b55e3518129e8115f95ee3666e41e2fadf17d486aa17cc5281df5c6f19b88855ea6ce17e848f2808395be79d0ce67943a6afed871ece274be1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0eb779ce03fda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF335E81-ABD3-11EE-812C-6A1079A24C90} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410625527" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2660 2528 iexplore.exe 20 PID 2528 wrote to memory of 2660 2528 iexplore.exe 20 PID 2528 wrote to memory of 2660 2528 iexplore.exe 20 PID 2528 wrote to memory of 2660 2528 iexplore.exe 20
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28c67a8ce5fb0306d0ef8d7e2fdbb21a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585fc8373a6b4aa2ef0d2afeb1e32ab17
SHA1fae695cdf0517ea8e7052a7717562e907917313f
SHA256c964e2bd53e153364a07f978ca91dc221647f9d89d5a60fdbc7340159870a69d
SHA51207d5ce6ffe54720bd9e731673cd76effdfbe69a8bcb30d690cc87ffd19d9bd2355d9a17be1feefeb4ed027603756bb99b94bacfe8400317fa6409bebeaaef2be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7942b19f6899724fef0fff86497e65c
SHA1424d14b3ced6e3faeeae620e7856e4015e1882a6
SHA2568622607c80c2279ae51c16b4998723d3497b9a9c1d993b14eddb9e5ec169229e
SHA5126c6576ee9e16d3ea5414848987364dc86280d7e35dbbbd5180497ea50a3d1bdc7369f29864d913621af0da1317aaff958dceed25b7c6deaef981c434186cae82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50de476b5be6420feb9d89f36ac887f19
SHA16762defc4b0e7b5d78fc2b0957928a6101637b77
SHA2562992b6aaf394d5ad2d0545bfff2af477e8f548826c920ad50dcd23468e419a4a
SHA5122d947940afe5c5dc742f746b652f2f1b4f98c19d0532f8761e46f5dc33bd7067ae00d02304940afa35d7f3ac935c23c0841dc8515f1fef4a7d7a4e6eb438e406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6e80ab8c19d482282f7e225d55d9fa7
SHA1c21e5d4391fe825da85da0e47212e15c9004346b
SHA256696f0b0a4d3cc4c1c0fdc62f7203b85ed3da4bf9027e897e8ac69e099bb07929
SHA5128809391ba142cbf4d109426e6e4e4794606c72302d7eae34681812939997b75cf39a806fb69d039171e07e71c90651271fc7530eea3e1b9a4228ef36cc332b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548c6593af7cbe68364177a5269a2bd70
SHA1b27b28490d5673e8d8f57a4d587d1e721a872b6b
SHA2563a1d9b2fd56c540dd1a0c79263d82293e892e58191c674bfdefe476222238834
SHA5120df6a543470f779ec8e8049513640d7a090125b9e651142c9251eef3781a1d1d63764fb0d947c793d6ee567c8a058e0224b2924cab9401b19f2a108a71942412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559fb9423e5034bfb32c20410f98818cb
SHA125ad0f2c10616994aca7d16b22256ae58bf6095e
SHA256906e142d4d49042d106d434a17367ea3676d6bece075514ad3082674c98df6fc
SHA512a9e4d62219da2a5d8b5c7431e3881232e501d0baffb76006ce1b0122d2417f33f7e0fad904d8cee494af10c630f03e012bf72826e35335c728fb5baa230a1532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bc29f3751d6b2af09b266cc21c3cc9c
SHA123e552361996d473496a204e30d5c3c81ba3f148
SHA256bcb09e69b25accdcca99ef85533adb8ab19e849ce189fc1efed4e0b2054a6be6
SHA512353a7339103612d5c621d0718e76014459734e4546590e223f6cab5d12c4b593de544fa1dc256c4d405ced29d1fe6ca35b5393926426b8508bbb6f5ccbdf1a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d05e1f26517adcb9b5c60164e4a09941
SHA12763c6b38733950279e78a855fa6d2e8bcec830b
SHA2562da601325d0d47952aaa9635b33f1c5aa02e269b67a50ab88bf4749a771eb7f9
SHA5125731e8cdb6e6260990a4801e0dc41d5326227cf32e04f76367f051305f60369498a1c236b25e17f4a7e5a72738d3cbcac9fcf1b3414c42c59305aeaca1102c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdb141c1d01c4eee8be0fc26e7f966cd
SHA194c64dec7ac60817ab2e255f2d5ee5620d686ba6
SHA2564d8ed5dd3acdbbb152f26b91bfbb456f4174bcd329afb9ebed41603fc4d75b46
SHA512f8aa446de628790192568900e086f7e00eb413b9c489f7f6235af7fd2de968a29885a5e5d88cfb0ae1f8e24088bb35d42d26a01ec67cd3c1c6850210e6c9ae2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5426b1a39179573816b9134a600fdf1df
SHA13eab7d69566df0220ca0bbc774911f2f382a5863
SHA256e733f11239ad150e35c6f13d27f0bfc65450646069c06207c93106a29cd0c60f
SHA51219af32fb372aade9c10f02e70c8a91853c6cc4b63f9a9dbb0ce3a6d704df9a9661b5e7193cfb337dcae234d5d1c1c89d20fd4dccad701cdb8dc585a2fc8db084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5709712bef4cf553915050ed9f085bcea
SHA1d790e7030f2422b49b22f9091583a9d593a6b2b2
SHA2564a9f92b1ebb882e50fbe3d0d79b7978c4d880d39f0afbe037828579ea6cf91a9
SHA512fb9bf1f4f85c853fe33c138067019ebc7d5127c15cdcd80859f7bb69f354de690cd2f55622b135acd04f3832219a7fa944086defc1fce7dd6deb3330a13bd009
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A89I98IL\478691279-postmessagerelay[1].js
Filesize12KB
MD592169c8a0fbf6e404267d0705cdbdf42
SHA1a5cd88b74ca5ced239cdbfb458fe25540d671f46
SHA256dba668b49a111527aac8f616b9053ea57c944e01a84ebdcd02a13da921223384
SHA5128c5d35ea512fa7be367cd9a9ded2f23822dcce730e5502a355ed0d48949ef763eab13be0d50a66de6b0f8419d6a002c12c4ddbf20d97f5393ba922e48a4f02e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A89I98IL\rpc_shindig_random[1].js
Filesize17KB
MD5f019fdda31635d2a31b151ad8ad56c7a
SHA16adcbec55f66ffaef83d9a134423aa98eb2a2189
SHA256c7fc0b1526533002c956ebf8e8c42c3ad3f96c41ace73fb4063cc89051944831
SHA512fc278c12316e098976833882a38c788d812f9d36bd1b9b2b8c87dab4dc906af26a860df95436ea1b7d509236d44d0533d475a153437f8f5d42653fc28a77ad64
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E1CCB52I\plusone[1].js
Filesize56KB
MD51944af3661da46249991197817b6cd8b
SHA1f952df40ec79fafc7c798f37aff92878977376ed
SHA25663326a1c4e0eddd3501f0a064b06a2708eb0362f3ae934f53145978d3d0799b5
SHA5120bef19b32be337cfba179ed9ce4533a207cfe645d2e5fe0da9fadc7b01c72704fc89749670d1ac48b8d494675bc62ac089fdc4d8495979226f10828225594376
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YV6H14B0\7NZPO0OV.js
Filesize157B
MD567e216a27dda24bdcb086c2385b0cb99
SHA117141c80f5d32bec3691c5ab24741d8b7dd5f0c6
SHA2569dc433b2142d3ba0803fcffa53f19d34da26996d20c829df6d694bc887325dd7
SHA512802319543dc64cb011bc2684004e878a842b73aa55e4da1141ccb8650cbf42fabbf2b46c730760bbfcc7a140e11700244b9f5da78bafe9fca7ec7825c12b4255
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YV6H14B0\cb=gapi[2].js
Filesize64KB
MD5ee01651d160cfc55249d6011a3c45916
SHA179d6121df6575974ad21dafce33ec98e3f2f0a7f
SHA256639d75299973c7d3794eb7eb129e3b5a6139f9f521e1f14383abd0fd501219c9
SHA5128a39dfc1ff2c58ac106225976aafdaf7befc0a28903a0c65e2c272e1967c3336af2b477ec12604400bb8e16aecee6567c9cb9d157e3d54649e28b9b2f920432f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06