Analysis
-
max time kernel
126s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:21
Static task
static1
Behavioral task
behavioral1
Sample
37c8850edc663f31c4a3fb2cfd3a12b2.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
37c8850edc663f31c4a3fb2cfd3a12b2.html
Resource
win10v2004-20231215-en
General
-
Target
37c8850edc663f31c4a3fb2cfd3a12b2.html
-
Size
189KB
-
MD5
37c8850edc663f31c4a3fb2cfd3a12b2
-
SHA1
ab557ed842b4876f0aac5a81e2c3f6fe87568243
-
SHA256
76c1efb1476f66284c6e9c87b393ee6de71defc36a82dc232c3c105b26cb956c
-
SHA512
d63f408563ac663a3c3f4391a646e1b64aa89557f7c904fa54e97f9c08f29f7b36f131bb72a31700388c7af5d524f612d94dc9bdfd8d9359a7079488f1b86de5
-
SSDEEP
3072:BJ/qzXP7SZ80mt8zQ6RuJyk5eTI0xCJUZPeQJNZyJb5Qf99//Bqyix:BJSD+mt8z3wJyLImCOZPeQrzBqyix
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411068677" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0acfa62e843da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000005d78fc126e30b7722fdf428e169bdf30ba391fab63d9d0e1e25d5ef8b6081780000000000e8000000002000020000000df2fd728d3d0b4006d3f616ac23403c2c20b3cb6688e1e286673eaaf0dde402a20000000b9e4a2f4e59a39094540612d31e1b8026cf889d5f6b9a5c1938beccc489c7bdc400000006598589aed498bbdace1ba266e2b8fc1ca70c890c924ca5da010eeaf015cbe2431eb02efddb26470c6b35e7c426b3baffe9dbf56397d776a59faf108a73f510c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{853C3471-AFDB-11EE-9FFF-CEEF1DCBEAFA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1808 1700 iexplore.exe 14 PID 1700 wrote to memory of 1808 1700 iexplore.exe 14 PID 1700 wrote to memory of 1808 1700 iexplore.exe 14 PID 1700 wrote to memory of 1808 1700 iexplore.exe 14
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37c8850edc663f31c4a3fb2cfd3a12b2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1f453b0f309fd2367b4e11ef4c381b1
SHA12ef9ab0003b0bf7d82003a859d747a33762b14cd
SHA2565a08b29cdca384dcb7aae7345bc514fa0fd8676e85d154c58264bd9412801273
SHA51242330dad07fba088ecc5154d121350892152e4298e6492110bf3b8d4d1fc950ff88613513c739efdb9aa1fb78f6d30a1b981ba55a4dfe7572718e80433cd688b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f1339f3be4536ce3363af068810a0b7
SHA10c8c779c4b9b378bdc333284c594fe4dcc06eb23
SHA2562234c9c0fbc3d578e53e3d1a960e14e83e8659e0d7eb84335bb2a215ff37f443
SHA512f189110ec0a65139a38f29e61a19defa89432f9ffdc8cf77de8a42949133b741c8b89d095f861b732a51096a50a93c94fa8ad48344051279796cce81d2fc38c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bba2bc5954f54921045cb2a45f41fdea
SHA14c540f5829937115a00b6f3ea073b247d81e3669
SHA2563c7b85ebb93178385e1a488b846de475cd028ce40583c7868c3824599b1338c2
SHA5125800999f1da88df51287c5dba70ea818a4f5758a54474d4f8dfc2ffb2e69bc70818bd80a7f8155b3b97661cfcc3ee9c71b2679f3e4fe8d6260b242d5b1e3c80c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59da7c5d14bb154532c2aee9b9c971425
SHA1c139591ff795f1234ba7d53ecbd5a0070a83fcbd
SHA25667ce67e24e38f235ba8f96665acb40919aec60cef82685df4966171749db1694
SHA512ed70a8455e17c898fc8fa722de348bdcb7fb664ab9409dd0a83f1132224ab56254d1307cb589bd83004cdf4b2e614a30a2a2310c8844f8da38fde38feb1b5176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd3ed9b96f305aa8d2ebc09e33dd5b73
SHA1854ffc8f528f2c4478033e58d200e6b1fdf8378c
SHA2560f5c5f4677a6c4f5ee2d41ad30c41db39ce7b094194693a03116342a22e24fe4
SHA512a80374ab6fd0c6258a6931df5fe8f280c0105a4548e7371f2824370938863014ad804393d420d301d0eae1ccbce5d83d165953a5ecd38085e7a8369a3952f357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5081c264be8a874db8378929c8d6ec2ed
SHA14cea4dd341179a1b90147e0e90d9855fdcbd40fa
SHA25694dd16786a2118dd9e345797fbb82259ae9381184eaf74e0716bfb1a9ce6f259
SHA512b37401a5dbb810cdb7f8203a6dc4948629f73b349a68735d2dddc7c5b6197ec736d449bd808cdbd39335d7f69d7afea52e552b3e7e5475826410f3b3282a0ac9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06