Analysis
-
max time kernel
142s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
388877856ab43a4b354a1ef7d34baee0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
388877856ab43a4b354a1ef7d34baee0.html
Resource
win10v2004-20231215-en
General
-
Target
388877856ab43a4b354a1ef7d34baee0.html
-
Size
7KB
-
MD5
388877856ab43a4b354a1ef7d34baee0
-
SHA1
728bdc88ac75ef33971c2a670ab52714fd5702bb
-
SHA256
e3dc4671e2f42612e5c96a39143d4b0d27567427f5269447d2ef5868be919799
-
SHA512
1df764cf53953835411bbd0558edde430c8cdf0f7749b344e065fddd0c928825cc4d2485fcf18a9c237d48e363541187e04b6fadc5affcc152c9140cf1a7ac1b
-
SSDEEP
96:uzVs+ux75LLLY1k9o84d12ef7CSTUTzfqK9xJVycEZ7ru7f:csz75LAYS/gGb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b512b1f643da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D682E781-AFE9-11EE-9075-EED0D7A1BF98} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000f2bd5a6bf94084c6aec96648885d74ac933cf1ff54436d876a1e6f20cdf44886000000000e8000000002000020000000aa9804509a95138571de5ddcb257d34254692ed79592dc7a26fbcbbf9011732b2000000003e6347ecdfe542775cbd6c97d876f3ee3bd5f1ef6ba6eb023c794a1352ca57c40000000a10d61ddaebb49cc3042630b2bcaa1d5b34020a20391799f55408b23ea102a58419f3297f7c97d2c76a4089c522758b6326075363c730053a859faf0c789570e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411074811" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2644 2756 iexplore.exe 28 PID 2756 wrote to memory of 2644 2756 iexplore.exe 28 PID 2756 wrote to memory of 2644 2756 iexplore.exe 28 PID 2756 wrote to memory of 2644 2756 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\388877856ab43a4b354a1ef7d34baee0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529a44e7fd66889bcc59e2cbcf7893e67
SHA137b070b515f0c8ef1a014aa95e6f12f063762807
SHA256a8aa9f6fc6aa50ea530b89aca4d820d857757b47c7fd1b5688669be87c295918
SHA5121b37e496bbbe2d542241a83bff4c3bbbc2324bd76789040110808bbe1ba35d052a23eb1f8cf12f3cee6f027c6890ce0c1878f01499e8696ad7fe6860adbf7528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544a480f5445ff6891f123b2066228ba5
SHA17981ffaabfba3aa734705d36583b3cdd2483f556
SHA2562e5fc5776be2cf9abe28985c1f481875a120c29cbaf3eb836e41bfcb1c759a46
SHA5122a3d9ace89fe5eb2495fa2166944e98bb2fa2009df2675756e8c13ae63c464f7a961c95500d301cbe67c6bd5e90c89ab95e186c4c2d3386824d2999072723b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dedd7e248fb7852fe2c6f79866ac04c
SHA1cfe00d3b6db9587e1901563b005777fb5014bcf2
SHA256752c7516b793635b00633d2639a0023bddc38c22d03e916f9f199ba19d249ff2
SHA512ee116c402c06022b40c8c0d1bbc44368d29d4aef63cc14587fa7e210b10bd56b4c6b8951a373e42f6873be35ebb5685ea9059503433ccb3f087e4cf94bb8c87e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e61898b5413625247fbdfeefe197f47a
SHA1e987dfd828bf2890457988730cd03c90164abf9d
SHA256c24c49848d2d38051804e0bfa43989558cb281d16fd99a7e01024c9a7b627638
SHA5128cb08f704cf62e45d7be9b643b0587e17f36ef2a21fe878b4591193e1f19e9e04aa583ca7519cdbeb19713acbd2bfd7b512af7b28ce481c0bf4bc1113207253e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57552f6de4ff2485a00662d905cb8b8a5
SHA1871eddbd434e52adec052ce390f2e74c9b338106
SHA256f37f0ae8b3fccde94831bb5781640ab04c04016bf8da06307eee0724cc6c8598
SHA51229b5d3f18d7d53670f7f5aefcb2919a85a62d518e665af5f58faa7be9f511ad17379af58198939532f89ea92fbfe11dbe86086165b7ae19cd6e4af9f921229ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5589a80a7db939b8b12b4fee4871293db
SHA1564542ff473c3c2009dd3602128892916f9e9521
SHA2562d95a0f89fa1228ee158aadd71d4f7567c41420b2727ff46cb4234a0d6c0ad67
SHA5124fbe8736f8daa35411b405fa937634a8d27f8217a4fe9ee578dd5299680699a0b29c0c1a6c34fbba75c66e4fcf87a91136abff3e0da26ec17a9ce6dc0f7e2e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aa7a1760524a5afce42c1a8cde6832a
SHA12018cfb32c2e134f9005beb2796b52b342994cbc
SHA256a67a995eb38a4587bd4fdf0f6b81554b71933b7951f4a0e1e7816548dadb604d
SHA512c08801538342510028ca914456b0fa7591759b2bc09e487326daa62186470b6365526e9c8508de105e1b6bb31a4db1a10c368772c589746e715e3cf6f52384f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578bc9a86a755736810b7b5219f5dab9d
SHA1464f4cf284520115ec7abacffce40958e97bfaf6
SHA25626af45295d1a02bc844fee7f76f29c17fc98f01468577c36ba3b938d13404279
SHA5125cecbff929b96066e74148624b11c40f98ce952ae20d4ecb8eea58650430f645f9f869597f62e6816bf91e7984b8b5dcc58fb89bb66cccf4882e826c51154f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539e3d2e5d858306d1df1db459a6cbe77
SHA1582cfd6fc4f313e9085eb669dd0886ec6dac3963
SHA25631984625f5e6854d6344fca9412383f28e6ddfcdace151eaf6c0c4a48eebea82
SHA5124b7ba90b9fe0a86e48cc721532997e72c358b8213477e9a732722881cf1f4e7238db46d3e9b5e6c5b8f09e3cb32808291489e424b2814f4d946a7901b1583c0c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06