Analysis
-
max time kernel
191s -
max time network
234s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
3e17f0f0035f8b175058af2b3314865a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e17f0f0035f8b175058af2b3314865a.html
Resource
win10v2004-20231215-en
General
-
Target
3e17f0f0035f8b175058af2b3314865a.html
-
Size
204B
-
MD5
3e17f0f0035f8b175058af2b3314865a
-
SHA1
7156ab48bc38af6a3fff87ac2e725a939cce7c15
-
SHA256
f583ffb6a8415591403af1e85747a59dd58d0e1341844f2a811ef865b81bb44d
-
SHA512
fb2bc6bbebafb510ec267a0252f4803928c14991caef4ca9d1887b04948d23de154b3f6d7ce0ef0eef97688a376732de75873b568bf9e5e4ae2d6b02c202dae6
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cb0065063dda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410311898" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e91786640000000002000000000010660000000100002000000045f81c383a61fdf608f0c587efb0236dec747ab35444d4dc4c8ec6d2ce8eb06b000000000e80000000020000200000001f9aa80dad4d90d97850daacdfb059534f1cfdd98cd83767ad4168a575ac98e22000000081b7f771c2901c5641587d36428ab1e647a525543ec29c3c83f78ad659be3c0740000000f8b25d6f78fb2624fa45975b87932d9cc53bfcd6487470d9a0b7e79aa3e4d695ad7d255b8a925cc226b2e0f84fadc0dd618740a938b566c30cdee76ab4ec1722 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F425461-A8F9-11EE-A552-CEEF1DCBEAFA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2724 iexplore.exe 2724 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2996 2724 iexplore.exe 29 PID 2724 wrote to memory of 2996 2724 iexplore.exe 29 PID 2724 wrote to memory of 2996 2724 iexplore.exe 29 PID 2724 wrote to memory of 2996 2724 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e17f0f0035f8b175058af2b3314865a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569d0245d52a5f4543f7fb5f3b652bcbd
SHA1cc40158ec13ecc32f51de365145207eac823f92c
SHA256c029295592c89252de52f63db373d2a016a25ca174e131b46fd0f5bdd4baf3b0
SHA512c289a98c308299d9c6c5883e196582f36be907142b383b8aa99aa8993f4144a5b4eddcc939256ee3438e9ec6ac840417062d5a7725e46b463054dc48f4365371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3a05997af32babce7f0cbd862de9665
SHA1ecced80bc66dcbd285c73dc12f868b20eeff5599
SHA2562d0f4cae891a6bca24bfa9d4ebc3b73b281fa384e33bbe4decd98f6c86ddb53d
SHA5124707734b03e6ad862ba5405237185b3be492b9e160edd282f783be43f9375ffa20ceca9ce5f5bf28bbfa2f297d1830c73a699ef922082f3a581a48b7b35b57a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4dcd53f20c54c4c823dc61263b816d9
SHA10d2f4a215dafc99baec0b4b2a03cbf6f820bbeef
SHA2567d87e1a9e09afcb9970c73a24d79ee20c0fe8efc8b4f6ccd68278c98b50cda02
SHA512d07364818b4f9665b6e99c1ed9a6a00abbff45653b1db2761eabc3d660506b367eaa706e31dc7842476010df0f7549c448252c253ea984a0e7b8ac961676b39d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597985e02198ace76a48f664713ab4a6c
SHA11e15a4d9422257cdc18fe71cb1cd877f94444568
SHA256c847ec9690249996832a74b748dfa2df61e110bef9dd03d0895f81e5645b5b5a
SHA51258f99f8a63d68e80ce96f59c2fd74e1fe6403e2195e2a0c6d99dd7a7b49f47381cbe00ac5b22e1c4f22e04bd8ee509211c9535931abfec364385d98306d41011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f776c8070ac665ef59fd41011cd04e0
SHA137bad991374137c3279042a03d1fd1efcefc8610
SHA2568cbd38bdd122c588f33a0da141a9a8968732a6a5f0d4067c2398f659ae46d41c
SHA5121ce808305f410b6f79750e32512162b8dcbc135a1a8080975f40a256fcc307c75610162b29f50bf62398f79fbb8546adcfbbb42a94d13c998230e9060269c629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a924edfb376b1bca5df4a4c258c4004
SHA19753de46961fae2d5c74cacf696a40a1d44adf6a
SHA2566602c57145adae12e45ff6b2788035adac5a3cdb79cc0c48b35d8e3dd42fbe5e
SHA5123a59af332f8d60f80680447414676e3762da7df74c1fc1265788ce9f9f26882908bd240fb61477b460df0f83e496c6379d1ddd2d0037f2e8f62e8498acf76a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0f9ed5e6560a7b85c5061c06348a033
SHA1dc4582543b2a2e336ba0ced6ba5ca53ecf40225d
SHA256a303188a0c2a727d9821d8da647244c6bb1c80441be195c9761fe8457d9fd1ba
SHA512ccacda968d01878302789c382ce67d61745132044a1e36cac14ec1be7e4bd573168ecfc60ad1722ed1f87c975ee5b5c6309e7c78b69e8fef35c5437aba26fcc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06