Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
36d19ea9d9a6de22d45fe8e0ad35275a.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
36d19ea9d9a6de22d45fe8e0ad35275a.html
Resource
win10v2004-20231222-en
General
-
Target
36d19ea9d9a6de22d45fe8e0ad35275a.html
-
Size
38KB
-
MD5
36d19ea9d9a6de22d45fe8e0ad35275a
-
SHA1
4c3993b2e554ea1ede83ec11c0be3affc478c92a
-
SHA256
d407dd9848eacce905d2b018a32cad5d38996b884db5ef99a0516f08e5f6b81e
-
SHA512
d70cc55dfa1a6ab81d9f687263f62027a26908e0ede4389ca55e169e0b0755afca338d3f3fd8734a3d56a029f7fd89a80e7d92e22be793ec39a0858ea73798bb
-
SSDEEP
768:YayHHvPWlohL44JLiKOQpxrBhIF42SIjr:Y3HH2lOL44EKO41hIFNr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2DC8871-AFCC-11EE-8EEA-EE2F313809B4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411062315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2936 iexplore.exe 2936 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2800 2936 iexplore.exe 16 PID 2936 wrote to memory of 2800 2936 iexplore.exe 16 PID 2936 wrote to memory of 2800 2936 iexplore.exe 16 PID 2936 wrote to memory of 2800 2936 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36d19ea9d9a6de22d45fe8e0ad35275a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c8b422445402bc60c24f4918c4c6086
SHA17006dd26b5ad3a86e805ad2862a35ef4751d1408
SHA2566c11c3873d09ff7a32e23d7307a30a8396eb07a8c0d25d3d433953e0e1ee8321
SHA512d0f9ec16cec8566d908c4e3363b6588f23fb03e08560edec8f29358007a755ffeecdc7e40457870b5108aca43ad5bdf397246239936b6c74608171a3f086fc76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b71a5fd084d01919ba835f351ad1899
SHA10c7f819de40298695f56d40b024bbd5c2ee3f473
SHA256b1d8d061faa40c0a1e5321626ab7655aed98c08a8017ea113a2473ad3e1e8688
SHA512f96e80deb55da283725053b68b6e6fd63795d665117d0d9684422cc8b092f9b4de97d85b0fd96634819a6cb8ab04289534c1aa7ceb8ff918e1b7ad23a753949a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545202e274f5831779a4d04491e9c974b
SHA1ddc44def56b8e44489179e2decfc36287bfb438a
SHA256929df8b189c55c6e5ddce6aa8212a57e84e5da252590dea23e6ceed2d803dcf8
SHA512a8b6bdae7f48fe6cb641f39686e07c12c585cb768d996c87e0a38a45f8a31e0a6432c38cc3f3a01e14e475df7718dc4e7735ca5e1808904a66d62cc7b6d0aa61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3127236be725970c2ebf21ca7a01a8f
SHA1c897df4334eaf01f14d0f3930414869094ba9705
SHA256a355603ef4461ede3a9f5a33d5596e3bff6af0de07fdf8d125dd147e39393dd1
SHA512793606ad820b6465bd13394d8cab56578fee779f91d3cb13696dfa017ed425b06268132f210dc672a0e42a9dda6d828d156990c2a99f0719c8c573f408537ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5537f942c064a5f6a99ca3f2cb7d5c47c
SHA133047a053bcab1af4b85a82bd2ffb3878c9e02bc
SHA2567ab4ef132ee2a70e3e2c7196565253d24f2c7b020ab714ff1b5015e5e136d688
SHA512aea1be27873f5200b3551dd312caaa99eade5089d723334ade661ff945d1ff7d14da6fc096802f8c2039d61aa1f4b5e007907079a095a07740a0ed1a9a35997b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535320695b0047b4f0d7349352498024e
SHA15dde215be35bd5f9e7ab26e96d4c24447c79bb1f
SHA25607aeee90d1d88bccfa0c93e2debba086423f27c007d5fb223a21fca4d03e712b
SHA512ac2d9d651ac17f423d16ac3f7db068d9b202c02d0d443984588d0d491f8d52adf2f39351b69b671274f62ab7252b4b27153d032086d0909373ee7044bf873851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513ea044f77ad3b1d77dc2471820ac19b
SHA1877556103059bdfa86bd74ea9bf547797fdc6551
SHA256979742f146fbb7606d437a590fbb49c3cf8ee2296649b4d246f0a10674d3a5ba
SHA51276687723d298e5f50372d877fbde83671ead734743ea4c8d388b07429996e4e397c2c721b50ef439b3f9f1eecf628e23448596218f17dc69aec07409b21cfe3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acbf9e0be770554a90265fadede084ea
SHA117e7c4a2d03cbd987b4bb4cca990a97626fcf861
SHA2567bd7990302bef73af4a9a4c5bcbc1388a4bb1e2e49464f2b6fb6bc79fd89761e
SHA5124862f970b52b6b4e60280bf6a671f21d32a36e5952bf7a66863549e77f0d02bea481a95a1293957eba2892c3db6b0ec4f503e9853b9243929bc6a1efdb5f830a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53e5b4ca02c802ffadfd475b9dd3df7ec
SHA1403b045e9b7bc5e62aa099c4679a430b1964ccca
SHA256a4828cae85f528ffb4275417bc01cf0a2c75a3b64a7c24ea8ec090d0fc94a339
SHA512c62bf19d749685d5ddf342b234edccfa335df87cef5ecd2468eaf273bd55f3b47e36b04d183993a5746edaf5403d77fca14324d18ebf16b3a60f99ad3738e199
-
Filesize
54KB
MD59d81c6d3a63de4e3c5683b5b473e92ca
SHA137c3567ec1443874b21c2417a8a31622dac42f9d
SHA256626ef32207715d00c2ca4af466d179d39896b78cd99e6c00c9fa38a2d0eeb9a8
SHA512f7071664a612dbc2c690c68767b5adfa656176c08998e09497331fcdd4f2e34db3505cb67e63f1d5908482c5f0d38751b02d59cfe2082cf46c1d8a75d309db12