Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 07:01
Static task
static1
Behavioral task
behavioral1
Sample
2c8c229b680cc9e07b0fcdfb45eaa849.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2c8c229b680cc9e07b0fcdfb45eaa849.html
Resource
win10v2004-20231215-en
General
-
Target
2c8c229b680cc9e07b0fcdfb45eaa849.html
-
Size
3KB
-
MD5
2c8c229b680cc9e07b0fcdfb45eaa849
-
SHA1
ae903fb9249171198d05905cbf047e36c09ebaf1
-
SHA256
04bb8c7d0a32be7af132433c44b9a913f5df34e3d5bf91d77e8debf8a44bbf40
-
SHA512
8342771558f68d9d3ec0eec6655b023e6f58ea7a462bd7dd85b8c65a42c25212333edb9dc5e1bb0512d2321a3aeadd98ed88e6464c97743a858e0e8a763851c3
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410358508" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0EC0D1A1-A966-11EE-A371-5E688C03EF37} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 406ae5e3723dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000006c2ab1de7ba69f3c0f67c67d610cdcb1580433e6af74e9fb749d87c36145b7c3000000000e80000000020000200000001988022b77e6018c3fa584155cefdba915d7906ed7aabef47a5729c7df81e9b2200000008d8999e586cbd2689fd761d2d288c4ca045048343e982a478182c937c6855c0e400000006bccbe4e2e9c5e44fcc2f0a71b66f781f5d2ae93f128718f241511e9cd58202edade3afc4233f41ed19f1d401c9cfa0184774f37d0f1ec1115fac296e0425301 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2748 2912 iexplore.exe 28 PID 2912 wrote to memory of 2748 2912 iexplore.exe 28 PID 2912 wrote to memory of 2748 2912 iexplore.exe 28 PID 2912 wrote to memory of 2748 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c8c229b680cc9e07b0fcdfb45eaa849.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55917f75cb1ffbfe49190459f1bfddf4c
SHA1efd0a72d9ad3c26a76fd253d9b8a1177dd68a6c1
SHA256722bf9f3007f0119f143d9e2862607b5c7e0b2b2ab07ad02e5a80f3ce86ff01d
SHA5123a2f3689e645cc98670c45d2f92e9db7bfc2ffe388fac753495f8c787f7fe03cd1b117fbf4f25142875d7c5f28706ebc91ae0f0514ba0a5990877367939d8b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cdd41f732c99f4b71d9f7f6ce336f39
SHA1dd0b6e2d949ca9dc707496ccab6a5c46a015128f
SHA256ffb47470c2f3c261f338d29e2f766d2e26e5c7ff2b18563d94f313450d1cf08a
SHA512463e47d46674159688c87f44977f7ead301089c3b6fec940e22b444b70f3c1a455a1850dc500a36822ae583195cb7f23a2196b46df09a0ade923f38c5ed9a2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaae5198e9dde5246fdb2b50ef697edf
SHA13166424c8cf267840ecb9f2bd18c107b25892310
SHA2566f0d0ccf39b08a453deb82c29c74c5803e2c2ce47cde54bbe8860881b9961065
SHA5123a47263377f34c5656908f7dd94970c0594acd3f8adcf845aa82f6b62db202e9e6ba2a19c588d485abd62f8669b73b2063488a84aef11a22b13b11b0ee9e03be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512c8fb75005f60c1814c03360879691d
SHA1075823235329da5ca1cf4ac7f7135883d7bc5f30
SHA2560a1d189069f7b9f77d7a8e06554175a0be4bc084a40cc0b08baee9fe79323dc3
SHA5124ecc50e04e9b3ae4c363e13982505d3cdca93e7084c89cd0ed7e00e4f55162d2b65a721d68e8267a2f0a9b34f803b0a5a64a9af2d9d2228e450f6b87fa7259d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2464e8d753a5d14ac3a3e2c56287397
SHA1543126190e6610eeac2c21f759881d6f04a6591d
SHA2560eba4f3fea0c15f721ef15edcbd97419c860917b43fd9dc67920c9ccad5b319b
SHA51206bdd8c0b02c7ca8c1723aa25fc8b58617043a64fd27410b2725e509768970d86cb35178b153645e7704f537ef84c3dc7b54f3f1f56c938b1034920eb22ead13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de0e771d165ccb67f4fbf6174713c157
SHA11c6975be4083fbbd273cb19328e0388b2cadea8d
SHA256039f0976b6a279233f07ccca243382b2d51c459a53e0711f96a4a3713a75b99d
SHA512efa9620cdd8ea530e3097551d875f1daa13d7b828d5ebd84e04865c07c62980ac050d1db6c8377ae3da7b54e9f5d36b7fc03c991ba161d261e39a9d62a5746ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd7e4067c8f770c8ec5a824b1d887eb0
SHA1e7ab4f46e771946685ec785ad805a1866686c430
SHA2567906fd0184816ba146c77e945d23c77502032b616d85e6d3764126dc40e86635
SHA51232f71ad071493f35f1e098109abda45b2da315e432e72817a088a49c08fdc73e202669fd9768c76106241289caff08589bdf752cd5aa652e75c03eb39650863b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06