Analysis
-
max time kernel
187s -
max time network
259s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
28ede312674c83f98ee5bf392ad75ec6.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28ede312674c83f98ee5bf392ad75ec6.html
Resource
win10v2004-20231222-en
General
-
Target
28ede312674c83f98ee5bf392ad75ec6.html
-
Size
213KB
-
MD5
28ede312674c83f98ee5bf392ad75ec6
-
SHA1
d758f2ad52a1204edddec2ddccf0d73bd4ca9074
-
SHA256
b519c19565e60acae4f9e6b3f2611f97045557ab098240cc6bbcb5529df9c539
-
SHA512
f4e4f6dcd273cc11688f43432a2bcd444da94a8348608a9f174eb52fc874cb579e2f951adc710fe0fe40559f15082c36fda04f9982e27d8d2feb6228d0d09687
-
SSDEEP
3072:2sDJTqKzf1Ltp8y3mYsXsn42dcCQj0KPZ:2sDtqKztLtpK2dcCQPZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410626804" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4015ecbee33fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7277ED1-ABD6-11EE-8575-62DD1C0ECF51} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c1930000000000200000000001066000000010000200000009d5c20fdeee045e91eb4d121d7168aafadeecc869cfb1e0991e50040683ee464000000000e800000000200002000000052582665aabc040eda60894b7933f87c59b9251279704aeff7294fb0ad59f3e2200000002c029a8a0cff0027453e2efde1a3fd2940634285d22a8a7dc302aed311c9f6d44000000009d66845d46fe3221b1c8bec575d684bcb50b6ae4cf1964162523100ddd099b6fa0dd655980ea48e2ca3762a8fcdc38e50cc5f9d9d178d45ea21f01fa9bbf739 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 528 iexplore.exe 528 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 528 wrote to memory of 2876 528 iexplore.exe 29 PID 528 wrote to memory of 2876 528 iexplore.exe 29 PID 528 wrote to memory of 2876 528 iexplore.exe 29 PID 528 wrote to memory of 2876 528 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28ede312674c83f98ee5bf392ad75ec6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:528 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5416a5da343a6e740aecf7c0e4e6519fa
SHA1db1c91b0b1c548f0c49354fc90bd204d2f657495
SHA25650fac6d04f9c18dedf56bd643713beacaaa4c6e22d6f37591a83bc725fbdba69
SHA512f8767612669e6e2078d874a4fd12aa1feeef7b83081a070e174ee4aca645402c09f005b0640d9edb4eef71778e649946b88ead6110ae8c2264e48b8d2785da10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b02b674dd9e358afa542db6764d57d1
SHA181c7006d5e263e7c724ad98e63c8ab24dc0f6c26
SHA256fd312cd983f0affd8a5797dfb9fa0f3121c805d91482286d933d0350ffc1df0b
SHA5126360d07c79274cde25886f0521260f431c1fba8d504b82c2fe6e943223904f7a3035a631961675587ba06af0c6a35631dc3c5ac1dd6b1ea87fbf2c99cf59c5f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528b25471f80f1785b08609f797f1eec8
SHA11279cf173807240e5db142fe02c40b1bb154ddde
SHA256d9c0c9f30424c99468e38c512639ed9ff9c3f16f7e7927268350e5bb9989b7b2
SHA5124007b56f36d0d6686a8bcc7fe9b9a7e20f6d666d15f6d1e21441d0951b5f87eb868bf299f76cedfb002c4786d46ab9e461b2f80243613823ed80f1eebff2a2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f4ac28eb4027377b56e106ed2ead6e3
SHA1ff1327cc9f319219463da60742fdbad0f8895f8f
SHA25624e5dbd1a9b64af3ed5409f61918fb91e4b2237df962992ee534f3a27ac28fda
SHA512ea935a8f28df2825f6c1c13fa032dcd7d09c8fc3d7f568318fb1a359d6a15e896f14df048cf9269072cdcd05467cc473c46c6c1eee59792fbcc9ececed4c1496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e141a7abf5e09656c67ffcc2a3a66ac7
SHA1c2a83089dfa478d4525543ac78bea5c0e361aa98
SHA256cd2d447acb05a382c554a620ce0a29bfedbe05867776385a5603ad9d66a502e7
SHA512dcf7345f4d2c52d8f85cf89aa0081c8d420cd443c103d033e1429b73b7056c7564bf59a10af1df7ab36e871585f86d37fa818ff7d0e35dafea85dc56bfb9c44c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5459f2986d930c04c8ece85462052d6bc
SHA1a88d6c11a3b53f375c2ddf4251eb1587392e0d07
SHA2568c0320c0a2c68f41256f1d11922c26934c46706d25355eb92f4aa2a6ee3658fd
SHA5126f3102f8a89abe343df9c9d0442b185fe49d25347e149757c7dcf02a973a459e7a75ba90e328f989496eb67867fccf994951e4ba8ce92f040335d9c7647e2612
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06