Analysis
-
max time kernel
122s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 17:57
Static task
static1
Behavioral task
behavioral1
Sample
3aafffb498095819f5159c21d498e166.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3aafffb498095819f5159c21d498e166.html
Resource
win10v2004-20231215-en
General
-
Target
3aafffb498095819f5159c21d498e166.html
-
Size
53KB
-
MD5
3aafffb498095819f5159c21d498e166
-
SHA1
09042775745bc338eccf92610b316d1c6d9785e4
-
SHA256
e2a18fd173a0415c5024a6c49c8028d108c56cbbf4235923a21f60de68b46f62
-
SHA512
feda452e9a28183f762c46fea9abeaf30c9d4b08dfbe0db2fd71bd62ab8c5421f29f9d8454d1ae431ee08e3d1c2969a294b4074e3158bf7c7cb7091344d935b0
-
SSDEEP
1536:CkgUiIakTqGivi+PyUhrunlYK63Nj+q5VyvR0w2AzTICbbPoz/t9M/dNwIUTDmDj:CkgUiIakTqGivi+PyUhrunlYK63Nj+qI
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000005fd23e5f5284fd3ad273f54dd41b41f151b08e997dfd05fcb793482bb3d69bca000000000e800000000200002000000067f7d53225e55489d9600d673e4a8f2b990d3b6e971aee3297325332f9dcd48890000000c8b3ee3c13fb497e3b8774d10a5a464ac1276e145e1c6b3dbff781c51f7f4ea3875a21c515062f77de9986c0261028f45e4b11408973d2e085b2a55774e91885ccada9d319662ddb58f30a10c27e3bfedbe5e6712782702e8f8c3ab0fed9a3960449d30b4301c035f6228a962f328683455b892baa2119588f09970ea88d8dd4492d94977ae3b8edb13fb47efb81c78340000000f1631624b050dffb6149c69a984974859408443badaa7fe86eaf010e1f0e42cfeb8798cf4ad092d1ef1df6ab349051bb5b3b2781d0931f32e2dcaec5dadfa20c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000d681409bc7d82e4eba76a7304072e228039bb41b5bf75b0684a1f9a748f1955b000000000e80000000020000200000005bb439a601743fd3b33e1ba9a17fb1f8b9436e389c733754f56163f0ffe265c6200000000773b3e7cb21367b54ad9352fa4952f0957063d10ff0e5ca3e143c0ec7976b5440000000223d77ef0e7fbe7379d4f848508a61f3bd3b2d8e377244bc3988509e3b0c215ac5b4c709e5e95154345c9420866c949092efa1e35ade3f157e72de126ad02c10 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411088760" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5133E0E1-B00A-11EE-AD08-DED0D00124D2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b09986391744da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1528 2644 iexplore.exe 28 PID 2644 wrote to memory of 1528 2644 iexplore.exe 28 PID 2644 wrote to memory of 1528 2644 iexplore.exe 28 PID 2644 wrote to memory of 1528 2644 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3aafffb498095819f5159c21d498e166.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d26ecc32c5d88efbf712a9556ddc7ee
SHA1e4457383dc11bb7c6138980eb5ca148e5d1fa9c7
SHA256faeab88a2a899ee0a090559ec52ebace0847f12894990111eff329e75146eebe
SHA51279cf499e4928c957f938ded10c8a8ba737a44a70633be2b7db4b34002262275e788bac4dc18ec889043ea7b0ffe658e916aea9dbf82457b2d67736db54f2e3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fcab4ac321bc047ecaee5c1052170f8
SHA19e7326ed960f0e0dbc3f363f93e10648ba1b0e8b
SHA256e14b66c64c59c43cec66c192d7b6d987794e4156845ad069c1525674bbcb81da
SHA512c25769d8ef55dee600d5853c4dd3ae14ec790647af63c7fe86d5c8360349fbbf98c713b489900c154f8297841ffb1cb4e22bcd622e6b8c1225cafab46031025f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57885b00092a215fb58f8db17829b9da1
SHA17fc4356bbcc49e6b4da3620b07d995223cb95fcb
SHA256dd8b483a7643937d08c5426c2639cbb27e3c1242152291c1131561f258664a67
SHA512b230b9bd4d93465b7c3c1175d86c4bcc208b51d791ba9bca671afaf111d1d19f100d16e1dab3b0169309b6880f4b5ed5efd0c862bc34f2d399ec8a60e0c05271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554eb99d9792cf487793e352096c08d56
SHA155eecb43963b203c61809dd52c91f6dcfc148e8a
SHA2566c6a65b419f57808fda10f2ee2b43a69fbd9c3d56a0246ada6b817031c9ab48d
SHA512201011c8e0d41d9fc9a40deddbe6fd4286447992b7dcb90041e86722bc1484f5e2d27006723e78876e3f7c89de8607efc1bed190c318b2cb4d42855a6892b397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f5f23443df4523fe183554439c9b66d
SHA1e75d696bf50892b13557fd61715926b82a9debeb
SHA2562704352b43173e35808b318f50ab83f138ad2e6acf0986fff47d92488154c68e
SHA512a3087f45be1334b0948f54e2390aeade28d7544954d80cfa8f44d3b979465b01666a6fd2041d62a9c2f4f09b7ab6299986d85fbf4a92a33da522227de12d1d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a5c1e43d9f9515083304d320064c61f
SHA1fc74c0e3e735e323bf6af40f9fc7b5002007b63b
SHA2561a8703dd0245077014dfe7c0686b982ab9c15c92fe15116fad2cfa4dc87fbb68
SHA51256210c012d20c273c38eaf28aed2ffe914e3089b49726a20bd05703ca003abf4e40dd4133c49d1f154eb34517ddff60149d96475b86fe53fe02aa22d62cd49b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fc2d5ac827f574e93d49580b2ca01a0
SHA1978ef87951a2a2a13e9f3a170addba9c9399569c
SHA256cf0d00706aeca4861f935afaff01c47fc82bd419d99b1fb98510cac13f2261b1
SHA51237cee732e17d58fe3f07b35b50a4be7ee5d92196bc517f891c5c518b3cc1d1ec9629938f3ae6806afc0704bf41a25f86b2f84819454ac67ebd111ae621a6dc71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dd5596a4910b96cd12fdb3b80325de5
SHA19fe9af70563a550e2c3ec5431f2000ada9d3a278
SHA2567ccae0de6722b615c0dc89500e1128260ac6b86888886a1c09399eff0758a300
SHA5125e0721e11dbc8ff485b278eb03c95373784fff19c49fe127d64dce773b1cd6fab1d1319a300083c4c2b81d132ac9db060860793bb6d4bf25d3d954d0c7bcd3d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5903ef095b30e9301540da1d8331091ef
SHA1b9cdded7c7de5c32690e596e9c33aa2a833e1723
SHA256df8867aeba7fb49df716456ac2231078d463972de74570911828dc9ab3bfdaeb
SHA512f5b3ed58e75edb3bfd0a5d0fa68b1ad786b479d1b70e7cd0262d434bfe3cdb81c6197349ba45c4946c4b4a4af034c6f17a0227b175ee92165c0b64545c8d3f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522e4910551b68e7aafe570f1b1fa5a77
SHA16cc35b1203440f98f8e8b5e583a889e219986bc3
SHA25665b9d05869f6b191ce73e305d20813d229d152f88ebb4caee87c55c078adc6aa
SHA512f54e1014baf0c2f6d2c379715fdaf51ac7992aab06e2ec6e78f5aeccb2059116a02ed821058588e162ce7f2251f63f4ee5d2a86ac25175669ee3a67a0222f8ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5833f14a122a64d36a201f249d5ff32f0
SHA1fad89f053ec87f2ed2ca7089ba47b84bb6f05dd2
SHA256c03c153a9288e17060141b1506a6d3c8a151723985daa07b2d4dc393f2747baf
SHA5124ba90b3c1b8891e68b96951b47eb2aebb99da59aeb7078fd28c74c43c31f9d7fa35beabaa0461afa7bb0cbef485870795e57dabed9c7b29e296481c47c0227d0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06