Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
3aeb99cac84cdf57986662c1a1f31a98.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3aeb99cac84cdf57986662c1a1f31a98.html
Resource
win10v2004-20231215-en
General
-
Target
3aeb99cac84cdf57986662c1a1f31a98.html
-
Size
12KB
-
MD5
3aeb99cac84cdf57986662c1a1f31a98
-
SHA1
de4796c4a167e5018151e87b475385690d3d9386
-
SHA256
8e427e2246da228e2cd1b5fa3e6cf6e6242ad1eb2f04d3dd089657b3040179ab
-
SHA512
4cbe818457a27228e86ec5d71c882c34bc01fe8f8d15c0509c383148d8aac5000c92d1d85c90ac21cb534c82614d0038c8d6ae5c1127beba15b8ff7a804c523a
-
SSDEEP
384:xy1R1QREDBeVliOd766vU2ee7Io48gXaRuY352CPRrMO77OM0TCtxYLuZ4mXYHbq:xy1R1DeVUOk6cz+Io4SV77OQx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000ddcd16456be5e4ecc2a21067204e222ae4235976287811762049db0fe3a324ed000000000e8000000002000020000000bac8dbc8fd98ff55bec63f3786913c2113f8ede2a4e5812ff39a3bec2578c92b200000000233532ad7a7d9761bce876f8cddb66cd507b342ae1d8375fa260b9c098d23c040000000556fddbe18d7843f95a5fe410279c868832629d97ea2b6cc6d5c558a92659a04ade82b2e2493649f26e7d6a7c7bc7b2de5667139b07bf19cb5aed69acc002cd7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000008e3d788b5bf74727ecfa7220d168d5980f01b5d419c7cf5c55b366f556024843000000000e80000000020000200000004f6ac6465855b51bf0d95fd94ca5cac9d95fb5b8980012d36eaf38f3a506c8ef90000000d612cdb5597867d661bbf5d88626345e4b47dfca35c405a8591abd0a9cecf9746d3a16008911af285fd6d71949fa41f52b812a6c85c4e460392bd9adae488b219416b1e1cae04e6e08d0f627efece0c171424f7ce6ddc6a6d93a576e4d6c9f64d790713bf5033281a1d8620c3ff22a6c7daf5af57dd488770e7ae1a08f77aae05d469c4fc822282dc52d278feb0955c040000000765e49e410b8d6ac23d85f401f4a96c1ba3511d813af8ede0cffd0253b0916adb903f43118a9da900d07c42bdc62e181b3850e2b1f06a99eb38088585d79f182 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E5FDC3E1-AC26-11EE-BC40-6E3D54FB2439} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108d93bb3340da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410661227" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1472 iexplore.exe 1472 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1472 wrote to memory of 2056 1472 iexplore.exe 28 PID 1472 wrote to memory of 2056 1472 iexplore.exe 28 PID 1472 wrote to memory of 2056 1472 iexplore.exe 28 PID 1472 wrote to memory of 2056 1472 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3aeb99cac84cdf57986662c1a1f31a98.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1472 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514af047906d574636a7770d78dda9862
SHA1a6dca7bd6fb2eb1973cc7137744ab0621ed9fbaf
SHA256ad2006d84943ad8b3ceb0ac0fe4890e39edc84e6b0de51821f4c5e9bc349326d
SHA5121dca662f7914d87f5e5d943c42a3c4547f1c2b45019dafd6eb234af955c7a438b8ac3a9a06b8c2593d3f7e3cbabc59a0700e0e7f92d982caec4c7def4284e6c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532a0ea648c04830abe9302a0c92a4e36
SHA11b8bda990d2fa5c683ecbc5d863bfcf0a9318f33
SHA2563adfa4b0edac3113935b3cdf5de0e06b07d1e3184f42d5a6753e6aa9f9c6ce15
SHA5121a95f61252ad3a897555bc81a55a8a70da756e558b38f44584a2d23a1182ccaff45db1afb1b2b3d1e15aae6674705b10c09055200e1446bef985bff382d3f694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a3026e8285c2b5074bb6974e6a114c9
SHA12f168044d3a0975c16bfd4f7c5b2aafb6697b07e
SHA2562729d8699cad636746e2825a1a268305db0cf108284cc5b2319aac7d790b2dfd
SHA512a0ecd76f3bd88378896c0aa083c050d25d97ded9055fdb2069833c2bc624f86dfd217739c6f8c59b8700e448a524b1d6186ac95a281573b06675eab4bb1a90b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5386c15e11d59102cc1afe7c09c248360
SHA18128bd57fc574151c354a6a7533ebe1837eef150
SHA256de184e40d22e6b5c424d7a43443ca2bce2c94283741b4fe7661902270d420101
SHA512a1231978f356365555a91b8b067c340acc04b4d26f6b7a59f24fa4e07a46cd8ca73d29cb4401d5b31db3483e2ce19269689a126c6855178db59522cbf8e7a6f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b0da9b01ea867905d5d74d2052fd0c6
SHA18f6d79f88c93c3bb326bbf72b797a03725574bbc
SHA256ae93807be9fd9ca3ef62b7a5e615bea30cfaaae99bc2013712b57259521e0b7c
SHA512c12fe8c4490c6650e567509d28be6ccd750f5464a90dc255aa00e3dad7689d66b706b63400b85bdd3a65bc1e3ee05e7f64b77f9b95c6ee062ee36639cb963bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e9aae08cbfbabdfc036a5027ee2b058
SHA1f6257f816c607adc4d0027b0f15fe786d83b3fe0
SHA256ad11fe11dafb5c33954d9e8b03a1ede05a384e0ac050bf388ed6d5cae8ba1bb3
SHA51221a0b7a8fc75bdd7c0556c8045c18cd1e79d8085d57d7c8778a80939b7f5add5644fc0459cc8e265722046d26370f3d2e297fd850d4f03b363a9690bb40e75b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567106fb9bbec9f1f429c15ef3eb2d64e
SHA19fba36961d85263d21a27c5508e82f88091967d4
SHA2568a83fbbc27609701c567d53565f4d3a8b84459b0b3c34bc9540d289fcb78441d
SHA512058fa509cebaa388a4e8238f0d3bb2a9e07606746d8a8ed7db19084f09e7befbc1de22c882496dd9cd6bd9c388e272b631c567bd10d7b2729bd7aeb68a58dec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575c9f854bbe4791619a4876b944b4ff4
SHA1c8c3d2da71de1dbf79a65b542d161d9d2a0bb98a
SHA2563de521659a3ada615160f69447ccde75828861475afca02509e89f98f0c88e08
SHA5129ed801008bce4bfee1c97e87adf374c244352f522ce79f99aad4dfb00a034d6608263056aeda1b79e76782c0c3835bc6db548779225f021eeb452873a748b333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fd978ea19814ff0deb88a98c332dd88
SHA1e33ce7c5d406a977aa545d69814a72225e3471b2
SHA256027381b659ade04b6592dd0264f0ba68212ca8b141d55706a71657c3735533ee
SHA512498ba3ac3ac326fa46998548b24d19798286dc10c5bee565edcc6a8a4abe3703d6642f2a1cd46a4c92adb6e5f7bf9c71a6976e5ac0233f668b94545f14dede73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a64e0adfc28c6023f2dcf85d721f7d5d
SHA14ed616c3a394bd76acf21cc6a8ddaba318bd7d48
SHA256ea15d4d77451419a1c7b18eab740f0bfb254ede5b4b22575707fe6f25bd2b228
SHA51220b9475ac16049b4258db94c4efb6b691f8151915e8ebd070d3e601a2fdceab53474556b73384eaedaa0d255ab51d2b2e6254b529e0ff09745b58cb110cd2753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc4606f94940a5d3fce42c068130031a
SHA19c33ab3e44681956225ce42da4f1e9aac6d4ca6b
SHA256afb062aaaa458ffa2f04846d6187ac5c65d3ba4cc341a1a71b14917ea335a347
SHA51280a3b5f57f32b63b1330d029b4f1ed5356e1a41c1fe1905decc73f093b85a2e36fdecac9ab285c4fdbdac0aeee5069b73d9a45ed07ddfe64922c6ab5a4a29d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581fa020607a827e2313044127c7cdb81
SHA144c6dfc85957095682850db0863d5f50a25913b2
SHA2566847af267c270a24ba96ab6c03cb8b0ab1cc60790b11037a35498c0133da4a84
SHA5120a0b41945c9077d3ebb9adb09e9350c9165b42343a3ba15c9d1d682859ec951159d06e1a1279d1b0f4d62e78f1fa51ed659242f9c6be789d87f86554d17b9600
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06