Analysis
-
max time kernel
121s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 12:53
Static task
static1
Behavioral task
behavioral1
Sample
36d413428bb55f67733f02deb8aafcfc.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36d413428bb55f67733f02deb8aafcfc.html
Resource
win10v2004-20231215-en
General
-
Target
36d413428bb55f67733f02deb8aafcfc.html
-
Size
398B
-
MD5
36d413428bb55f67733f02deb8aafcfc
-
SHA1
b2faca6e591441b6c1742a89b3e0ad4d8ec04c28
-
SHA256
0d25c53f4863db3373e22f532427fb2233830c44150b7d3ded1cc2855d714cbe
-
SHA512
3b48c19473f8519ef18981d27fc34233b4fe025dfbc4a31af2cd7a73c94f7e43db7ef499df5bd50e962c9f5d532f0494e5b0b90f24c5e3db1053a513ea41cfe3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410553471" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{002F7931-AB2C-11EE-A623-CE9B5D0C5DE4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000e77a75635a08f1a5f211698ebddba56102cab9b0fbd3c086a80243c159fccebb000000000e800000000200002000000088c26fcfdc633fda88f36f6703e9f3cc5390a41566f30e602e4d265e6caf6d47200000006bcd37f3b833655a88dce00ff5763826ff1aa954c497059a2df8ad23d235af344000000032dfb4ea2ddd8a6f7fcf86bd7ad3dc17bbee4a0ef86b8d60ae7a6c9d2d8ed68ae9e0b439bdd307fafefc124ee88324bb4e44024241db965cf25168afdeee1bcb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40faacc4383fda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1604 2272 iexplore.exe 28 PID 2272 wrote to memory of 1604 2272 iexplore.exe 28 PID 2272 wrote to memory of 1604 2272 iexplore.exe 28 PID 2272 wrote to memory of 1604 2272 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36d413428bb55f67733f02deb8aafcfc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d5d234bf3378695b947825b9dba0a19
SHA18ba12a5fdfc3a5c8e2cd37b325b6eec811421500
SHA256f775e664db038910bea862c1b43e2757e158155241043429207a59b4f55104cb
SHA51293a1c0ac21b9cd04afda92d5a4fb6061c4139ba4fc344632423ef88a9779ef3fb10e7d1e6100b13adbb84a84bb943323e412866ad0584c9671d8956107b40e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53122432760cc7bf24c76126acbf8cc3c
SHA10420ddace451f81a206edb6c87bf642892742663
SHA256856e8852d2bc3e12bab9289377b28147622d256ab0a4f258e8596e55990af559
SHA51297629dd6e93deeeb99b1d44da3dec1ea9b95412fa2f4e38eb465fcf425c9ecf8e70ff945c75165f6fae11dd58c1ff5145afae4f202fec345ae2916a895f61fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dc7e21bed07a63243fc23367d5c6d95
SHA1d5642b31be9ba003108a55da8628223cdfc68d9a
SHA2569df59b86f89dbb9a45b26c0a76465519d9508499df1950470243f4fa2647b567
SHA512821eacef5083c0a1a3e77b7b88dbd7f59e5c976c0cd5527fe0308b4fefbf149e2d474bb45fb43da4387c0f3b47967f7ace83697a2319514e5fcdc78b1f4d95bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571cc6779b96d832172c63ffb618a9f6b
SHA111d3e6f31237d4e87bd3094c569eeb0405ef467c
SHA256ed557beec36ec42da792b240fe05401c23525cc691b9e4757b267ed2f6eedc4f
SHA5120da54d334a1d3e3a0770051157c3fd5a47c56a5719d611a6d67f88f6d5358c9aeb13af8c675344b0e82edae07a5459120e128eb13ac489641b6aa495012bb470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50550c097ebb1d56705c599779318386d
SHA1f567684177a969ba2d078b2822d9fc2f71575d4d
SHA256a77ab1c4de2c5abb36ca3be02bb7358b04162901f81decec2cd2fb06986e06a3
SHA512060fb5e338ed87bb0c926bab8afcf3b4bb56f3943f08b5bf9c81d23fcc5426b75a458eb472774efd6159f0760245a3f048745bae8a0d794fa59573c73c9a85c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af1bc65ae5e84694d6e16f467c8a8ff
SHA144ac0e1e9e89fb5806fec40579616ee941e8a474
SHA2560ca5e082514a798f4b82e1be94ea0a2ef06b9e574ae1493dd55608812ee4508c
SHA51216b9a7c8aeae39e48dc583a89fe6874d40170b3f4d116b0323c6b958394414a7e58af4061e1a2de4efee90afbd664eaf1288fe14a486f0da20ca3ed4a9ff4c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a265e9ddcb3db68eaf3784dd590b8429
SHA16247b24d8994902b0d5e3a2112a2e5f5749492c1
SHA256d16046c1f2d76c48fc033a1072c8e583ea8295eaff27009bfdf0127adb827f80
SHA512a1afd1061db83cd0868a26ffc470787ad0676f4fa2733ee39e3393b317a634665f4fc43ed3040168a96e5facabd2687b9380941b1ce9e24cb465a8575ff98dbe
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06