Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
36d889b60472ac43a11597a5c3c53468.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36d889b60472ac43a11597a5c3c53468.html
Resource
win10v2004-20231215-en
General
-
Target
36d889b60472ac43a11597a5c3c53468.html
-
Size
43KB
-
MD5
36d889b60472ac43a11597a5c3c53468
-
SHA1
614fc76a2341dce72dcdf8cc5b87e48d1aa41ebf
-
SHA256
e72bf8b012f7b7e19eeb21a7f8c9663180faa93bed179d2ad08fff259f171100
-
SHA512
c725af0c89002d2ab2ddeec55fa19cec7ea2c1189fa2e1b11ec04ead2de02fac7e16898c122596936e569a4cc8b0097f3895250ffec03aa1ebb38b3d3166e427
-
SSDEEP
768:Zcd9QZBC7mOdMkGpC5I9nC4F30icpVMJ+o9wBwowQqqGPd:gQZBCCOdS0IxCI30ic/MJ+o9wBwowVqi
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{178CF3F1-AFCD-11EE-993B-FA7D6BB1EAA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60af6b2bda43da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000e2a761efb6922ed476a9e8827457e6d8f04af9df4dd115db028510125d58acc5000000000e80000000020000200000001290993375cac271bbe23ff295eee2249890cb06ae1490c64f21adbc96d5a37490000000d3d75a610476be66325ac8329e76c2a6ed5586a7c18aa03d095204e1885cd6486d213762551374f643a57aa19f635b8f54adba349ad9e179ed4e1ab369b84c0e39c50ea99446fe9a6510896639b8d4de55cc0644d498bd30c78e7ca3d4addaecb69d734ce000f89bbe4bd082c861730c15c6d4034786a9993d941bd7564e3479cbac701692b127e46136489de00af182400000008d1bad5b62374be1c4f481a53d40fa8a366489db80e94fdff6cb99ce41273fc517376ce1950ebe4256c9808ea7bbb401122ec88518c832006052417089938a36 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411062476" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000005d27d49cd4a2b94736ca80e8553b059955b031501cfa2e95865e06f849607d06000000000e80000000020000200000008e577473596a5011e25bb8b90e31f223594eb8e613636397a1792a0218a123f6200000008ea3d20a292e8867d952bac6fe955036f5081e9343ffef513fd9ccb4bc10371c400000006a9d80480f87df3d4d747be9d7d757f04b8d6522e1e77c796a6b856471e52a4cac04680a2f6b277eacff61949cdb08077a43f49182f79ddae759e846345f46eb iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3036 3012 iexplore.exe 28 PID 3012 wrote to memory of 3036 3012 iexplore.exe 28 PID 3012 wrote to memory of 3036 3012 iexplore.exe 28 PID 3012 wrote to memory of 3036 3012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36d889b60472ac43a11597a5c3c53468.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56975bc7acd8d682371e2f3b02f472407
SHA1a3a239bc900ee9e5843ea28ba50a7f2967ab4594
SHA256226cef3387f532648a3849e997e55ca80ce7c4d14976b952a5009e74371f7215
SHA512c697b8550916f026a30d4ca704ff0190bd39892b5c6bfd521b609ccc3a642f97000e095b646faa5490ac8efb1fb71254b0479433a94e5e585efdfe73e039af14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be7a3bead926c60819085d99cb5f3e97
SHA17861fb189f85cae7576d949e2fe9a217d2d20a86
SHA256e76623ec731a96c263743fbe03997838160c2a90ba74d5485f405ae5f14c6a78
SHA5129cdc4da87f3430d5ee84747fd9a5e4b50c8ca2329c5d81fb4910c94e6da44f0c1e35ac901cec8135e90bc8e934e87ff61879e44b7b62d45e1c4c582f1f3560f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d2c75bbcb182d296040bfe88b230bc2
SHA14f1c1c8b19a472bb5d7c7e2ad15aca3b357db6ca
SHA2566b0e4385741f22804a0d9efe67ede932921c71d9eb3c7a33cdf672efdbcb5db2
SHA51212c8a7b6890a998e44bcaccabea8fadfa51e3d1be6976759916bbbe5fd5f4e77705e842f41c55e0b0f209091bc5f0116b9440ecbcabcd472314620e413f55aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5847085b498606050d9ff4349e9202b36
SHA18820cb9404b1135723511ea9796e5f7d7f1f443f
SHA2567684ea6e5050f2fbad0e89742f5796598a6c25f0cd56aec2a093cab95a09dcf7
SHA512af67e5c06a942dacde52daff1b95d848f36acbab1e70d1c57167bbc4a24ad3b95abe089910d30534388472a77b5f7227efd3bd3403ef7e14679aef3d3aede7a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9c90f89e91682b111ad1c8139b87616
SHA19853968758a9ac31bbe1e26aa4eef88659e97c3e
SHA256ac86d880e2227a170a8fab51b00dc2ecfddabc1ab4f592ae924d8e0b096cc78a
SHA51214de2177134ffc365ea8da6a61e57d02031764d6f46afcfb4e1c4a826a62632b50035bd155d9780c29df828684eaf4068c9703b066416ba11c061e099dd4553f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06