Analysis
-
max time kernel
122s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
3a7b1382a7002bb6df3197ad841a5f1d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a7b1382a7002bb6df3197ad841a5f1d.html
Resource
win10v2004-20231222-en
General
-
Target
3a7b1382a7002bb6df3197ad841a5f1d.html
-
Size
83KB
-
MD5
3a7b1382a7002bb6df3197ad841a5f1d
-
SHA1
1ca844578e87d1922f76cf8d2e0a88111c61fac6
-
SHA256
266a208f537cfd371d6e18213b2522843212e91048bf213fac840956589fd9ec
-
SHA512
715ae1a266104dc62996d0316c54f36926a059524863ad7401c8dff6123a2fdfbff2593577922843543cfc8d537829b13d5fafcaf9d15465ba7170b37ff8ff17
-
SSDEEP
1536:v0xP9QSEKQf0NcNtxNSNeNBNYNoNJNbNojxQ:v0F9QSEv0NcNtxNSNeNBNYNoNJNbNo+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F43C7F61-AC1B-11EE-995E-62DD1C0ECF51} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410656535" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cf20cd2840da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000008836d076ad4d26ec20e119dad6e7f240642835f161f9563543d9517d8843ee24000000000e800000000200002000000036ce4b7c79c5355c7eb3d9bdc2bc71e366f9ab58c7c65489abc01516d50eef05200000007607752059b859e1d7e11968f06eb87d14cd85f47bcb707e68b5c3afbdb2b277400000009803efe9558f148efbe3aacbe1e89388cdc148116f1a0fc2a35d1872ea3791f370a5ca2341450af14d9ddeacb3b461bf82e8e7e405ccc753d223fa15cda6dbb6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2752 2224 iexplore.exe 28 PID 2224 wrote to memory of 2752 2224 iexplore.exe 28 PID 2224 wrote to memory of 2752 2224 iexplore.exe 28 PID 2224 wrote to memory of 2752 2224 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a7b1382a7002bb6df3197ad841a5f1d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5c54a6778254d6c7ec7f193e13e47584f
SHA1d7b32bb249f909dd84deedf26eb09ee5d1c11e4e
SHA2562a5bda95d4a8f97ce0643c2ffeb2bde39436c69d981adeb9295993b5b00370a6
SHA512b1e040b397e0e17514e0e2fbf1ed4a4b2cc644f5cb613dd976558b9f31734bfae8aecb35fefa2819bc65cd13b46b4809143793bd90c42bf4df9242c62abf6eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_2066BB08297F715760972468E8DA4F62
Filesize471B
MD5755b7f338877a1fb0b2bfa9ed49aa75d
SHA18eb4ca731e183fdc399e9e348c0a8de03a8bb36b
SHA256753952b76088dba7592b3379758a55ead6112c29a53e40945f47c84dac5b2aaa
SHA5121a79d87e1ca4b1041f270719575ec4667e7c171b2b427cbd0c936d96fdab4dfb49cb2d6ae950166fab9342c80357e09b5ba6b1b70a20da9c3a328d6c4891d6df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5fa075a3542980ae62064b9119810597d
SHA17278b25c77882b7b218f05fcbfd0ab6d27a3e164
SHA256ef83f0c9f53f31cc72576a5d436538c6621af6fb219142540112569608f01520
SHA51232465af1f2e56271d8cbb191f88ff8e37892579bc24fce0c6f9b69dd76d45e91b8e16eaa4afe741f1cf3d0c63c9cf2561e99b2cd21819723e43f2b0c9bd60503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5478c82693fe30f6ec847f64fe077eef4
SHA1155468b1a8ff622d033d56cb51f9840163916c71
SHA256ab40299c2ad2caa960667e06d06910f67e236ab6cca423137514661d91735b2b
SHA5125e081f7899b966117f37129c5448308d383dbe19549c22890534edaee586956e7d07b72ca092efa47a19fc38b180345ea17d1c0cc6fd9d7f8e4fd422fd9762ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51067bd8d2c09a2b1f6bda8a7f030d785
SHA1f55b503af34d05a37bda66bc94b43b7334ee18cd
SHA256dff4b9c00f67881e107a4110ab96fffc9d5d8fc8d5a2c923265b69314e452f16
SHA512e84b54c84df2f401c556ebb6c2d565677f7050552c01e06d9e44cc007c2f8e4c28f45b1fca14d6b2dc7a3e8c7f2f64f7b1d0248f0bf47ba87cd0bfde8e4838b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4fb1a8b1c41fad6510c801267378bf6
SHA1885341e40f784aeb11384d042ada039a2a8cd27f
SHA256fbc04d39b6b32ffb2adcac2ecf147b18e8edfe3e678eb32371ede7b22425e2d8
SHA51215c522150604d8e5f05a4c2c42fe356510a52ec55bd2ad5df9a4d45ddd9a820cce5888bf25644e0d8c852b6995dd954ab990c8a50765b4d66723d36ca15e2fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586fced60c84433a6885662475ec8a0aa
SHA15bddcb77e78012d5577ca6316b6d3bfce6d0f549
SHA2561a2fa5bb1ad8a5af54904f45325dbd835d80b3b8aeb270c48a81211b760f0439
SHA5127adc9d4fa030ecb80a8427002097962c9afcbae03eed59bd44656d95bac2d951f0195ed0bc1a8ce82af607cb673eeb062574e57cba388ec28c6e37dae34f7466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5389e2b9f547700b8aade6ebce0390f41
SHA10ba3c57ad8602848cf88de7e15466e2de56ec223
SHA256aa42d530b43fa4a013415cffe133995b4d27d92d8cd0437144d7b2b84d3ba326
SHA5126bbf6507de7dccfe837305db14df2934f32911b80a76b2dc4ff16136a93384dfb47074849bb0bed609d8e452d0fd5cc585ad5ac7ae59dc5942ec0b79d957fb81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a4c4c3ea716ff61dbe1b04356e7ad1
SHA1d02979cd07e782ebb635c38305c7ed5d6cdcd44e
SHA256423cc1760071497085f91dcf22149107a976e0c9a32321cd511bb7e0c3d3b536
SHA51235c49c77579da270a9569825ea58546cae184a67cacaf8a7ca1ea68c65b3369859881302d0cfc8255629d728b80308b9dd3aaee940ca159d4cd1beccd26f3e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f6f9213adf41332e3d9808a6b6fed5d
SHA1a92b212d9a2161a96c18408c67c1a32ba50bcecd
SHA256bd16556f578eceeda90f1666ff85e9552a3ac6d78a4570080cc67d3e0f81090e
SHA51228a829af4f511044d9a2e679803544336d2158149d134e12f095a08077c1e56406270ef3a4e71edca5a4e2f62beeaf683e69a06b5ed91310e58e8082651ecde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580cb5ef6d253a750d843d3b90c58a6df
SHA17d395bd25526f7395a2292b95b3d57f410072895
SHA256186a490e06618fae09670f9fadb9ec641696cd2a63827d79aa11199cdfeaa7f6
SHA5128616aafcef179aadbdb5c02a07f3e9d26c2616319a06392002f8d959e4e02e8a217da00fa59ae6184b92cc264567b12394b7e73ddba02a010cc584b839fce9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596f171e459301f38f55b71431cbb5384
SHA163d77504e56138b13001da9fee447a1b8fd09b80
SHA256f64a01a897b9a4e9cfe469d4db67999d09536f537acf37c2cd1efb21a47402c7
SHA5129e1a6a96812df39c64c52f738699f00b1dfb4a41b98ef83993d343e07f434e0f91977aad625adac8567680f158ce759610a056faa6947dca644f382339a2b820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b8e7e47a15bcf8005227db480c4196b
SHA1ced5406192e5dff8e1ff227709933b9da8a10d0d
SHA2561cee12eebef5582eed333c22671544493e7d0ba7e22e0dbd6aaa812caa12d254
SHA512d5fc2ad4dcb6d2a5433c17070d1d202469af58e0fcded5c2b74bd6f9241d22f2071ef80ff4615204ebe59fee6f043387e12cfff272da4df2f9aa32b2cbffe34d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06