Analysis
-
max time kernel
127s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:52
Static task
static1
Behavioral task
behavioral1
Sample
38c122adf399460273f7953a49e41173.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38c122adf399460273f7953a49e41173.html
Resource
win10v2004-20231222-en
General
-
Target
38c122adf399460273f7953a49e41173.html
-
Size
45KB
-
MD5
38c122adf399460273f7953a49e41173
-
SHA1
492ce522c78a3fd175ca4b314cffcf134744a594
-
SHA256
49f296516065cd13d7908f7434a60b7092f84c2f713cb11c381973c67fcec3d5
-
SHA512
c7b4db96009b77859732700c2dc0fa818874510bb26c27f85e4179e0fc36399ba0a64d8c7fef4e95f71fb0cdb94caa742e747b188da57fdd25815994388a5944
-
SSDEEP
768:ckMH5ZtMoOAO0TjtiZe3hgfZ/WCHQZpQ4FFJVFLF0Fk2rfhcD24xM:ckMH5wsTJce3hgfZ/WCHQZpQ4FLV9Gj/
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000479df578cc1c4cc035c7994a0e3a577e75e822c5957f33de6ebe1c30e0d420b6000000000e800000000200002000000075cc8586d7a27ef25f36eaca0ea69306ec0c6d41153f78730eb7b1723ff51470200000009f064bc95e15a2199c4d176763daa2c8e6893d4ea5cfc988d144c2b436c04fef400000009b66115e9959318733b63e0d5dcd36d9cd015b4a6306fbda3ab41c9cced80885616707a8df5d0aa8689ce9928b3cac470947244f3daabe361322ab3fd6c35dfe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300c3518d33fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410619703" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37333851-ABC6-11EE-832E-DECE4B73D784} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 816 iexplore.exe 816 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 816 wrote to memory of 2704 816 iexplore.exe 28 PID 816 wrote to memory of 2704 816 iexplore.exe 28 PID 816 wrote to memory of 2704 816 iexplore.exe 28 PID 816 wrote to memory of 2704 816 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38c122adf399460273f7953a49e41173.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:816 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566ac99fdc1e2a76449ffce94701554a7
SHA192fdf2933c5101451a2ae9fa2ceaaefe99498c3b
SHA25606c0425b8287ace2aa180bfbe8dca583842ab3ec00c42ba9f86f927a5f738484
SHA512e53d49aeb9d71c55048291e2cd28d521774147b147b55106338b6c3e3ac11e195440d0db366688e2879fb4e7448ee3a450af55b73ca0b383e831b3f7017f5058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c997fe59c283abe16e3f468ca313c2a
SHA1752afb4ad0f068bdd74e14199a8ae91ba51e699c
SHA25697a8b2819d38c3d508e2ff49a147e78fcba62e6a05e9c81ec2987ea7a7d24e6c
SHA5124f28483b42a4062dbe31e6ad2102b96ccfa96c4bb9cb3caa1d45d369cd1df5f0f97f2bb4e1024c351a7f4aaca5262e0efd5cab5889541c30eea93057796f1e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6f3dc468c2f65ba11071a3c1b26c835
SHA19bace60661da298fb34df689a74fc1bc78deba70
SHA2567dbc8bf20b1ebfb98e1722bc3dfaf27c7998c4dcd94452ef8b5014b48ce1cb2d
SHA5123631edea77f235f9d5fc1e3dd82b6522a066fb9b9a4e11c180566f421955b5ba7127eaa9f8411fa92fa079906b25861e8cb81ded6f3e727602c4e02a9128f420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5070a4ad5fbc12d5a0d1b4305c41a9672
SHA1564cc6677f6d887581f3410b2e7bcfa1b12a11b2
SHA25605c8f6bc94ed1ce30b3d2b1427c8b560cb5ee3ca70355f9e43ee52bc248e66ce
SHA5127da68f135495b74adcdaacf76ada4c94f3ad4ac3ecb7a0097b865d63181b223c7c0f250ce8e2bb337671b6cc7d9c6be8b389f8e6344fed59282c8d5c08f1c5d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f25ca3a63666450b5b945af256b8b443
SHA12753056c316a13f5fe753cb86008180186166149
SHA2567472d02f45998910723211033d004523e1a99e09c88ac8a97a05c6745d8dc295
SHA5122df744d0ea07989c876643c8cfa42737bd04d321eb72fc16688e7ce7f5026373041e9c0c1dd94b215d858f1d036677dcd50d6289d59481b7426f0297b6d6633d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515ee527301b45aa930411591b4112e37
SHA103a837ab73129fa66d14fe77d6e34d36c489fb21
SHA25609fe40c8da5e384952ecb4bcf4feecaa26eee6d3db7d32492d80b25c3d408cf5
SHA5126edfc18b011c9079dfcbd7d6003202747cf2ca0aede7a015b4c78049d2814b0f0031a254d6dfb7aa70d10cb34d747c92c22202e94b400dabb8a8825e516145e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507e61f87a0d928696f84d592df867d0b
SHA190100515d0110e25da99f3f23237c43133fa4783
SHA2569331eed8232989d57db1a57b0f3a1fb6dfbb70d1baed3e8c14833461ce65c128
SHA5127f60ada65af3fb6188134900893bc0472a7c4ba6acba75f37e11610035459410583c01bc5ee9dc56d0be32141344ce200eb78e8fa5954226ca8af3846afe78c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac03b8609e21b3387f38ee01ae9463d5
SHA1a89bcd1bc2ef96be12802c31238f96ecf05bf546
SHA2560f446fbda739b7c9805b6123ebd87607a01c708c3abb5c8f9e022efc91b95eed
SHA5128bb219e15a81e8d60f4f8c4f79d5aadae9cdf2b93c4b010a0995d045405100cc3da3ea65d392e5a6f4df81d8a1eea5b5a7d165544bb793474a69fc2f3bb878ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc6613bd967382d45fc6e537092062cf
SHA10f8259f59c2a439db21c44706706a9d4a18d23bb
SHA256250a041fb6156e666dac2de23e392a73223511a8e1b71e3f558163424b46b21d
SHA512165d6c580c9155e9135ae5a5872f43b6b6f2fac5e3b4ef66e7c6ab0549fd2cdf2ffe113904d3369b2873df6c7b9ec17e9410ad03ae5b70515a11cdac9603ca78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc9230fa09a00a702af04f4a4de6b124
SHA168282a3836dea81ba15f4fbaa2452e8a0efd64e2
SHA2560691d5196cdb7b92fdcabbfbfee2623ed4509abe8b8e8767e91a1fedf4a60fa5
SHA512e752dbbc5dce03184d953d44a72e6be3b48d2d5e825d06917022f4f588291752a2f3aae981497a86c68b7d367c659d7c855aefafa45e563a46dc729e2184429b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530fdeb219262eb2841a4452d49b8ecc8
SHA1128ba6d11600dfd3c9850b0b8e0675f13ba33f2a
SHA2569308175b25ae0e87232b17d086fcc28e7539baa6160843e3b79959b80399c5c2
SHA512abad14b2f424b29cbcbc15a03ebd08001381f54c69349b3cd27d5bbc8c444abf73041952096285607252d5a87ca625e720c04bfded749510f1eb09c563e1a4d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55de42e99850087aefa4e1a75f55bba1a
SHA1affdceef9f08fb2a88d427e8cd40636bf6f47c60
SHA2566e942ee7dda4e71ee45170aaf88b17dac8f766cf565fabb020754f48bf5995f3
SHA51274fad6780274aadd9f0b400697c49e7b0a52451610ed28381393d1adc0b60c1ecd32477b2bb4d7ebb2601887d8700faa20b34bbb3e015eefd2d401938a175040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5476b6b8d228c43d509846e550177cd2e
SHA1884995f75296225d2055d8e3071ba6916af0db16
SHA25612f9170bc7e4916487f6615c576e8ab9bd06beaf08dfbd1f10daa78ba1f4ec7a
SHA512710841eb3880c03ed052d78766ccb3e6ce52f0602340b5b3424feebab6a4471594160b6e266411f80846123c8ff6f6b60837527ba5bd6e50521aa42a755be4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5690c671660481682f5720a4210a12b2c
SHA1159a8f8c96f69cce386bc8c1ee0e8f9c7aa8243c
SHA2560ef3268b20fe0ed0575ab5ba0401152cb35b374f85769e36357134cb514a3bad
SHA5122b2fdc6ff6bf5b66188a29aef5d47fb078b89e559d9b845d302d865aff6d6abdf60271b6c6a541847e61c116efaac2b78c8f6a66814a73cb8f296b1f7b8f3d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5fc700ddb803731ac09f4578cbbff27
SHA180f25bf28fd569fc71aa678a4d0426d095b0508c
SHA2566b9171e1e9169b00e56e9d9deb96668dcf57791feb8c587715698843b017dcbc
SHA5126e06a7ba19453c580d239b7edf027650c2db73856b8a8118f7d51a10537a0cefd62a195f03363773b7f55c1be31058d300e060531ccf58c0b851a653c6c77d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51944b7d18cd8979719ef1ea7e97e006f
SHA1f3ddef6857bd9753478ac60779ae10b3d42d7888
SHA256ef31cd79eec3884e839dd1dec114974031f81f584dd8ae78f8c1d2def4612984
SHA512d5309f53f3d502b114bccba2fbfb531d8bf8460e4120723924c2d9bd61a5fd485a8cb9a19ad066c595b5e6e30ba1057c9c2e94ae370977d29ad8ca711d5f021a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\05ZIV8W0\478691279-postmessagerelay[1].js
Filesize12KB
MD592169c8a0fbf6e404267d0705cdbdf42
SHA1a5cd88b74ca5ced239cdbfb458fe25540d671f46
SHA256dba668b49a111527aac8f616b9053ea57c944e01a84ebdcd02a13da921223384
SHA5128c5d35ea512fa7be367cd9a9ded2f23822dcce730e5502a355ed0d48949ef763eab13be0d50a66de6b0f8419d6a002c12c4ddbf20d97f5393ba922e48a4f02e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HVBRC7A9\rpc_shindig_random[1].js
Filesize17KB
MD5f019fdda31635d2a31b151ad8ad56c7a
SHA16adcbec55f66ffaef83d9a134423aa98eb2a2189
SHA256c7fc0b1526533002c956ebf8e8c42c3ad3f96c41ace73fb4063cc89051944831
SHA512fc278c12316e098976833882a38c788d812f9d36bd1b9b2b8c87dab4dc906af26a860df95436ea1b7d509236d44d0533d475a153437f8f5d42653fc28a77ad64
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JIH1AB02\cb=gapi[2].js
Filesize64KB
MD5ee01651d160cfc55249d6011a3c45916
SHA179d6121df6575974ad21dafce33ec98e3f2f0a7f
SHA256639d75299973c7d3794eb7eb129e3b5a6139f9f521e1f14383abd0fd501219c9
SHA5128a39dfc1ff2c58ac106225976aafdaf7befc0a28903a0c65e2c272e1967c3336af2b477ec12604400bb8e16aecee6567c9cb9d157e3d54649e28b9b2f920432f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06