Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
297189dd38711dde0d2582341812e64a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
297189dd38711dde0d2582341812e64a.html
Resource
win10v2004-20231222-en
General
-
Target
297189dd38711dde0d2582341812e64a.html
-
Size
10KB
-
MD5
297189dd38711dde0d2582341812e64a
-
SHA1
59a4057a209a0890a5c91ac74230ac3e287229bc
-
SHA256
31a219e3dbbf3b81fbf05cf655f04a67c62ede197503dfba6924c3f4714416ae
-
SHA512
c8d38caf0696e184dc00082872285db45955cf44861284f4a56f1033270bc3659c973cab8a0f3b5e638bc7c5a680c5eba9ed15ca9f710767d567a76b026b24e9
-
SSDEEP
192:4CgQzTQ1UB4+vCD93Wuy5x7R2z89cQVcOr17C/eVeWyX5FtH3y1SxlN2+Fz:4okUB4UCD3z89cQVcOr19gdX52+Fz
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F1AAF61-A93E-11EE-97FC-EE5B2FF970AA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4073b4154b3dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000a74b9b67989ec1025262d5b19bf218f5f498083a441d5d88b40aabaf01e8e342000000000e8000000002000020000000a40fc82c6cfb81052de4188bcfcaecd352752f17d3b87caf19121fc5853722c0200000001b4b3f934c7636e17fd4a4c98895457cf9637236ebf562818a9008fae64a010f4000000097a796eb7001a715a7c2869d024e436d2ac0ba954d6a1fa69f20d3517212b81020effbe8dd5b8d8c2ce656034c2ed78791eddc3e55fcff0ab8c3c689b576554a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410341402" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 844 2336 iexplore.exe 28 PID 2336 wrote to memory of 844 2336 iexplore.exe 28 PID 2336 wrote to memory of 844 2336 iexplore.exe 28 PID 2336 wrote to memory of 844 2336 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\297189dd38711dde0d2582341812e64a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a887857e16f3d8844a5551c4f8bc8236
SHA1e3a5769b1e9bd36f87b0f32f3eca0cc6fed7dc24
SHA25618aac2d2ddf81165d07d90d5f68238f354ca82abc6a57cf1dac405a4db70d9b6
SHA512d76e5b9b7809cdbc1c1cf3c2f0e0f7c3ac68ae0776e6638d84c1680fb19b9266f104e46ac2ac8866da612e4697d315330d5c631c60274eb7e5cd5a09f7a4b1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5779e574650347992b0fa0b5a3072ebde
SHA10dd72f2f1f503adbe3dd7e6bce6f7191203fb2b7
SHA2566e3a2c903248f2d6a82f0d7ba2b9db08a43326087aff2311fa2858611d4013a8
SHA5123a20fff6b9bfab601505c28b37e0d42b500f01c878d0e06534e7ef9050d3f40601c518b163fc9fd3f8a0c6f19e1621c5a39f89f83285d84ed32bd6a1ae23b271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5add5ea222b83b79edd1f003843408c3e
SHA143d463d119d073286be5ae605df340330570a5e9
SHA256f65bc3f997c35b7156fbd0d34217bf10dd9f9a7fb84ebf76da1b7f717e996c30
SHA5123b476bea043428c2a535364c7cc827c4391ff6426e24453dfb0a83f07d3545fb7fedcdbeb5bd274da0f9adb1a8f8060015fc3b87cd57d9557ab8b841a9474ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a5136194b3bd52f7d78dc4662eb13ee
SHA11647158e915acafd291f854dcb0c59397da31866
SHA256977f419ef06316b2806383034715e783106f7099df07fb34744144214c8a88df
SHA5122c1808ea0bb9b9a8151d2825da739e993c992b53f33045b4415f5be0f5e4c4e6be2eeebdeb8e71439b2b7107f00bd80e3087b800d325bdab1961db83694fc19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7d8451f368ee797f33bae73d604094d
SHA16c92cee6b2792b0ddfbdfa012af73e962bafd075
SHA256569243ab24959d23ba8e4d955b7d837e48e79ce1b84dad4548909218e589a503
SHA51252aa5e074aa88f7450926de9315e7d84431455460c6d759df8d39e8e756ae3b45b1c3b5986afd63005b996bb41becd70d1c1b5e7597de185b4b1e11612986a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524890ac9682c6b2524df758ccd0309e3
SHA132672976fd98eb3b0fd6cbb4d202c0b2658b52a5
SHA2563973d0491f31421224a55119f3d644996dd51d2e950383c33d2d67cffa2386b3
SHA512229f0f5a1fdb9bc3ce4fc5fec48c8fc8d2dd3be9928962b57eb2ec256250e11ac65b6edef8aab977b98780048d58a496e3918ca7779570853e74a7a752b16ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c35cc14fe35c5d267ade8a7cb6ce39b
SHA1e383689ecb627c00a243a941babbcbf80c49cda5
SHA25650b78f54d5a0059c6e2a012134f6c865bbb29d685f98f37b02f84f137684205a
SHA51290822048018c1ad18c2cc94c858b15ee976d02610d5ee69bdca7c87c0928b5faf973ce3cb1952cacf585d123d3c0d18a2b9a2cd796499aad5cc03e619bf9b620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5bf6f9c59f529a94cbc35096a74a64b
SHA104a2dd6196e60426b53d83e8342a635f10e270a4
SHA2569aba5103073f8cd24fa682b57eaab44e049f87f655a59d6266d11b91ca1cc1ca
SHA51233cd25ccd2ea57f510dda246f72d24f90df5ee40822f8860fd0789c04944960c4a40c62317c972f97528d77a0a34e11122f8b5c05581e05a132e7d90148e7678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545443972ee5072eed294cd37c7eb5bbe
SHA16ee1c5b8197c776a4506f8963990ac9fc388d2a7
SHA256cb319312191dfbd5cc368142d923d8e96f63a3409fba41ea071efa0c7c86b601
SHA5123ca34e0532419745d3f0d0f16f27969d729ce92dec4c1ee7fbc5edcaccb34924730e568dc1b647c531bed205de281aa2114ac46c464f5b14e2aa622a7b1d5f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58da47b193426adfde9476b0aa2a5dbc2
SHA14d7c6a838a9338218a0bc476845ffa2c66f5d275
SHA2563ef894e7507bf424817f386a953983d9fd9a92116598279cc109cdc8a3fe9966
SHA512075a0536116b89e10a47b3f0be3f84e3c7e94531f2a516086f271e0e7e17b4722aa569ffab6c4b848fa244827f278d30a255d26f833a839ab2cb403a3a6e054b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caa057f16ef742745e26ce3ebeb9a367
SHA1c353bbef608d23fa49d51a8abe36e39e34b11869
SHA256c6ff01d29dc0fb03606e75eed40b57b25b2a71a2560f6324fdad60934b3906f3
SHA512fe262248eec49b8dc5a323f9f16a927cc2675d168ce72e596aaec0a8d2f3e909082521f803ed547cf50dfd83d4419978bcd039ecd63f409aba07d3ff007a71f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59250d0dc75044b656ec321c0972383db
SHA16d649ae0cc4f1a596d354506998e611cf2691495
SHA25677e1048b2955a9c0d3b6e1d61d1b8562335237a496efe0fa1a2f553132bcb85a
SHA512436e653bab3c24135606580b3e12b17c6707ffea75d628774d3187c7f39bf5904aa5a6bb3ff88e22aad7ebb90ff1ae0c067cfb453b7286701ed484f2e207ec41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c797a475b889a532c5b63f4e87c40b5b
SHA130b9a18d0d31fce214327bb2998b0bc3dc02d636
SHA256fa001da9bfb24562bee8d56d5320c60df70900601019d0dafc730a3972528801
SHA5126fcfcbb189025bdf489235f8ab9e0f4645afdcf3f64841f77e18fe876e8d7128beea847b437dcd7fd858dc3800699e92e148c17c11f3384f6618e8d87fc2ed55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57edb193ab74ff48c0e60ed6f0461cca5
SHA1d8bd368eb95858165c87318b0b92702be8b90b28
SHA256de943d03a41230f6dffc345dd5f9a50c284a7a2cb322d15290577fce5376aae5
SHA512851844e7af30371eefa636a56e476d21018ded8a297ccb19f2ec79edc51bc6817572ea99ce5c317ff27215ac12faf712b7814c516e33f2dbd570bf15f45f26b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fcaa337332fdea2f696c388f998e141
SHA16259f1c53ce059800cda943e8653d91cbefc010c
SHA256943d463c29703307e54e5f036da12ed117f214847b750afde2ee47ede23a60c5
SHA512fc4ed13a2ec312cf90bed2da1bcd7f576fb4d57741d8fce03b6bcdf9b248e2643ee93242215a7d3f1393a22bf73716815a7adbc501b83908fb8d700ef8aacfbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509967afe3b1e4f890af1d239193ef166
SHA1324aa185bf85eed362bc73ddd9239a10b7234258
SHA25601da6205279caceab8ba9e64bd616af0e11c48f8cf8c7022a316f14392e4fb53
SHA512dc40111a432c1a22394e26f9d203904710719eb12bdc329ae33a4e74a524176cf84361a536c9fd355d22e1bdb88fe1420edff4a31fa19a99a388a1d4ba6f4142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5919e5016e5a3111c25826823c108055d
SHA114aeaa6d10113bd5cd1928e57c2cb049233a2bd0
SHA256034012a4b0ce86be3b82d593dc184fac771383f583fb05e6aadda80339f83fc1
SHA512db3d4948ff8a8914f1d08ead7207e50f9f4d5d81664c9e7dd47e83b55a87be4d571fa5e742d93257391bd242bd40e10d70ff4b85c5e82b1222817f6b6edab1a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c5a43635bb41324e40b0c2701ac9a4c
SHA1856e0ef74143c4de4d7e2312cb191b0f029269bc
SHA2561bcbc230e351d5f38f92fd635cedacbc00cd618496ac90b94316589524dde17b
SHA51264023878b80b9ef6cbf814c0a9a459270a89202aa47f80f57ebb655affe18624ad658974d143172b9c44dba6d60823170b4463becb624b1f37a85f74928dba00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcf9d3a41899ab5effc8b439edafc5b0
SHA1857002c124851826608ee1e2b7dc7e94f73824b1
SHA25637d228d34cc581b8fb63f3fd7140610859582e2c1b9da6f28853bf09ada2d6f4
SHA512f623b263501f46a5b9212f2b882ecf0c1ad350217f28b8460234babef8db0a9a9270fc3857dd598e771fd81af811b7ebd901e5a6864b24fbed1437ae51481c2e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06