Analysis
-
max time kernel
0s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
2a9427ae9643b506a27ba557f8cb5f7b.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2a9427ae9643b506a27ba557f8cb5f7b.html
Resource
win10v2004-20231215-en
General
-
Target
2a9427ae9643b506a27ba557f8cb5f7b.html
-
Size
49KB
-
MD5
2a9427ae9643b506a27ba557f8cb5f7b
-
SHA1
0e98a34db2a0d1919711ed11c32979ff78662f66
-
SHA256
16cef903a305a87abe4f22273e2daecf05bbd45e278f557da097c60eb2958840
-
SHA512
a0f52bb23918e4fa4eda548ecf7379e275a6736c59873c7c3e5bb5b0452f1823f5d00a9ab499c0cc87598136ccfbdef2be2551f399766895878d4c19f18aeae2
-
SSDEEP
1536:3WVv/VkCxeew+ee1ee/KHQAULiQ/HABQ3TfnbCZQsPo3MUpdMDUcOwBckQmH3NQt:3XOD+X3K
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5B327F1-ABED-11EE-9DE3-E6B549E8BD88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 1936 2732 iexplore.exe 17 PID 2732 wrote to memory of 1936 2732 iexplore.exe 17 PID 2732 wrote to memory of 1936 2732 iexplore.exe 17 PID 2732 wrote to memory of 1936 2732 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a9427ae9643b506a27ba557f8cb5f7b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f08287e221b0ab8ea62e7f9caca5f3c
SHA1d2339fe7ea1cd0b2093351a93d3429d76a4c94d0
SHA256b7e594a8935e0ce43e3e61bad4e2c3b60257cecfef141acb29088bf439c4e001
SHA512e3a5fe98b403f5bdc6c7a103386b9d15b277abe22657f79576c143b8c7a65e630827b3d9754ab9c35f783f9f0e28de3de0a3afd0b5e11362f41e621eddaaef79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580397cfa390bdeef40edfe70d31b8646
SHA138c8c9df1e986de37b21ac9481cddcab821f6b92
SHA2562e590250b08684157ad95b175d7293140d5eea5d8846219e42cb2663755a283a
SHA5126719470b6b2efdc1cdc096178e43fe047c46493b0f5382388e0bb4dd027e41cfeeba8d3db55aafddbf20a8e4062dbd45e1a3c51ebfd00b5daec9eb4bf62846e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c20d287261cd47ffd7da7405cb0c4798
SHA1dd65c3eaca9300a951222e03d0539cffe0428b78
SHA256166c384d453eb1b0d08ebbea679303b64f490983fe12b75eb1a8412e2da1c22e
SHA512d8f9f22a8d6692bfd2d57339f8c5f965ede6fa985ba621974f0033c3c12ca509f7f2bb556c5abadbf7bfa7b8769e33f8423a3070c9e66632a35ae64e32941852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c6f7902d05027235f1e632ab35638d1
SHA1ca5a2c1e6d3031be88fc2b72a17125a9b82e652e
SHA256c25e163b2cbb8e55ebd37beb7e06f2fffa5d084d0892fd8876976c5849bfaef9
SHA5128a3c6dacb5d866465a51f41174ce99e292e81027dee73dbe1b41f20cb9a715fad4bfb12f30a8a81bf42448f07424fad14291b79e1b8b22aaf194f4889c63f7b0