Analysis
-
max time kernel
138s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 14:27
Static task
static1
Behavioral task
behavioral1
Sample
39ceee99c1ddbc40a3e53b91a654da02.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39ceee99c1ddbc40a3e53b91a654da02.html
Resource
win10v2004-20231215-en
General
-
Target
39ceee99c1ddbc40a3e53b91a654da02.html
-
Size
6KB
-
MD5
39ceee99c1ddbc40a3e53b91a654da02
-
SHA1
a3e00950e72c9964673af4c306dafde91b5cc246
-
SHA256
e156007b47ba7827802cab4f764e5391978552084d9fb97b746522b641effdf3
-
SHA512
6fdcb0485e61f1120de4bbf6ac11eae8fe7640a415a557f8a43253bb954eb112dd85fbeaa20bf57f008b4e1572db7ca1164c3ed2ec40b35c043c673856ab16a4
-
SSDEEP
96:uzVs+ux7JQtLLY1k9o84d12ef7CSTU6ZcEZ7ru7f:csz7JQtAYS/Jb76f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000009ce75e17087667df4a6fce4a5285f92d3aa46021566dde80a2739f5594caf197000000000e8000000002000020000000a603d73dbc50acf81751fd94def841de93b2bfe4e7d7b0ee63d9f96dd9b18a5c90000000eefadb6350e76cc315c58c4deccfc188a2f218c5ea346a009a945c84201ec8d2d5cc6571083c9b84479f01281e800e7e7a42479f78e552c286cfce791a6a1250e00f285cc08569683e9f8f2a9a412c6acabf0a6b1b2957b861d230c1a5258bfce6820707c5b5803787d8591e46dae1b87390fe634e832d11b3e5521e3e1b8d16f74fb78ab0357b6ffc63201ee21f7a11400000005bb6dabcc354eb4a382f2a8e389b6ad0c1016c4bfc8a93f0469f3c1cd01baa0c248fc7d29df02ffdb64d18cecc8b3022246aa723761dd76089a34e02835900de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77D22381-ABFD-11EE-88F9-76B33C18F4CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405b1c4f0a40da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410643433" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000a211c8c59ca4e3bfd98431425c34686d1219a72357d4d69a7d94a96b4d65dbf7000000000e80000000020000200000003fa3a1636aa2c69ea37e24c8551c0f8cb9e3bc85c8b0c5d655321c3e83fdb195200000003ba05d4c01fd53c686b6eb8636ad927db1dffc0a8f22f70469c65902a27d538040000000353aebf95fe9643bd07cbe68a2892e578338c8a35515191c007efb2d46eec6fe03f6a1b89243cf560be8be6127e409a7118bcca8be45d37846eb79880d559d86 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2740 2224 iexplore.exe 28 PID 2224 wrote to memory of 2740 2224 iexplore.exe 28 PID 2224 wrote to memory of 2740 2224 iexplore.exe 28 PID 2224 wrote to memory of 2740 2224 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39ceee99c1ddbc40a3e53b91a654da02.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0736739d2e060df02fc7702d91c48f8
SHA1646d11b7674628d206a233765a906b7aca5cf708
SHA256cf08c9cd15854154c37644451bafffa1845391da1b5f0919cfc69a8562ebd999
SHA512af78ab48eab7b73c7619803d3a48fa7cfe1ac97a4176d01f02c12aad6d472c935014caee3a0178ecc911afc94c5d8f6f559520d8656dec9ac7051d3840cff024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57006af7ba8553f016ef1cd321b47623c
SHA1b080a2de5bef8d0c4ff9a3e6574fe001131af82a
SHA256c2cd563ddc6526beb6b4c119f3ac751f157f9ee2400d65fd92e90a28029553dc
SHA512ebcde511cdec3417d412ee3b0baf5281136667e0fe2f51fc29b01196784688ad40c8fcfe06eeed4a880d1480829e180985ef7c18899cdd7f02c5bfdb4d4f17bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524c17a55e5722d770523f154bc9a742a
SHA1a97c3347af6cf77d94dcdd32b5ee99ca9d0259f7
SHA2569abf7eebef0ac44643c976b47a3aae703d31f232c0d768ffe5b74df7cdfbd37f
SHA512c3580a703ce49458047e4008cb7c4d4c50218a485f31360e2088a7d81cea428ff32cbd8362053afb8a6b13dc5026c21464051bc3d27b608ff2a56b1ce8349ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f03a11c229dfed12705ba3c548950d8c
SHA1711bb35bd58bde3e793dff734dc5a8fea7c38fe2
SHA256847694dfdcf23933e4b80ff0ff875075faf2b9833a4d6eb59665efabdcc71726
SHA512d7737f9b1c5bc39c894ebb3670d7c2982b4616a5ac3a3d1069be14b58f027f5763904aded86644e1cd50478fed2db3b2b2cdf810eb94e6e67767da5cbc4832cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c06d5ce8f457956c3d33f36cb4f6c2c
SHA13e0e2b8464f9d2e926f62289803fd32d272f54f9
SHA2566fd4f2764fd2cfc8f0647107f531176add52b6035da214cddc8817995f99d0b6
SHA512c580223fd6f27f8007fc7f25b4eb809133fe73a78a7a3f1aaf133394f75017817256aae8484411f1ddf73514f1348fb5914236bcc901651f48a20e064e8c522e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5893112e2078feb9c63f118d2933aed0f
SHA1647bcc20ac00166d069894a7e16ae2767ba3f0b0
SHA25647a41482f094ce50cf45555b56e42a5a6fcb679af6f42373c57ba02b02bbedf2
SHA512dccb63ac18ef8a022e9038b731ff7e3809d7acdf50d7cd42a4327b11fdd5a67ae090b15d60ff2dc3082258c4d81c76e69e866102fa3e6889d2ddf95842252bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519abb5ba7cb9fc79faa2fc4288a61e61
SHA15409447e85c23a832182ea182908ba928914adb7
SHA256a7999802bc43f99790db8f5afc188a172801728e130232e079632a21dd24af00
SHA5124e2c3b251bed1bd3ff55711fca7eeafce471ccf9b7b9a5a032f14ffe5c6d77289a9f7c016f0503b0549f005071eda15b0e5d9b59a51c674aeb6693350f4712e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597ea2e1f5ace56362420af086dc62c8b
SHA158d50483316d175cfe5147afbc955441eca068d7
SHA2569d8c1f51632b6453ca58dd83689b1dece0f1ba6710efbd95ba2e60a3b5b894b0
SHA512e6cd395588128f0d2323d7e6b0ba0d56930899cb0a99f7afea28dd7dc2250ec256b9010f1181bdf7df73d275ee40e4f59463836faaaf9f350108c9bd2d6c6274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae7be81aa93e8dde800489d921d47e4b
SHA1c8b07d83f3eb15e13f11875e5f6f7806af05673d
SHA2564d50f5fd8a8979c8d1908e7fb4eaf57e3958bf791ade92934972ee87d2cf2348
SHA5129e12bfeeedcb41a416674b63d9f0c2616bbf5eaa26d47a03220bee70c22fd7e2efe012c31930c9380170bf3ff699a7c91f1ebfcdf24c85ce564f202929cb12ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55abc1c905201fc469a762b230d7b2b15
SHA1b6952a2631d1ceb4757564b8b3c3b14ab7eb55f2
SHA256e258d67d51afb68c3a4b94aeaa9facba6e96b6cb1400569e3fc4ae951ba7f9d1
SHA5120dad7b0566ccebd6caf8dea07001a003a544d158bb8900490c920cec8fdf00a2e816c732290fba214098579e26b6812db444dcb5274b3c89db6a00c00c49c004
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06