Analysis
-
max time kernel
67s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
3bdff5add2eae8ca668f4c9d8f55f5a8.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3bdff5add2eae8ca668f4c9d8f55f5a8.html
Resource
win10v2004-20231215-en
General
-
Target
3bdff5add2eae8ca668f4c9d8f55f5a8.html
-
Size
73KB
-
MD5
3bdff5add2eae8ca668f4c9d8f55f5a8
-
SHA1
1ba9a61032bba71aa3fdaf5590ea3bc8f046d7b2
-
SHA256
f558ce7eb0a0715ca466fcb149eae3ad9356fb576a6bdcd2cf98276c354deb78
-
SHA512
02a2431c3da25a0300a05084bbae3126d087aabf32a4c92df38f05601a54ec8544cf6d1ab2adab3892295d0caaf66d4094cd5418c2c87632db3b7b7d5f617b18
-
SSDEEP
1536:h3LIcwnheG23g+cIXP1Iho/eQJtsfD++GZxbVFknE5mW3crXhgYT:mKjWmYT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7CC7A21-B019-11EE-8951-5E4183A8FC47} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901d35cc2644da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000212f248d9781a9924d275db0dc4e602d0ab98ae12651986a17aad75d12f86ab1000000000e8000000002000020000000733e2cc126ae20fe373c1e6a4d9774e87dadfe9edb153bfa924dad0bef5a67cf20000000e7fac68a1a8c85efaa634052c4cd4fc2e77bb586a996aca99e4f4b68c7d4613040000000dfcee2b4831ddc1f9e4e026f368d6663e85e2207533cd4f6d1c4ad2dca70a55d92d16c6b7a43f35c1fd1d295692cbc99c8a3cb701bb0120b18ecfdd93f6a0226 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 756 iexplore.exe 756 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 756 wrote to memory of 2172 756 iexplore.exe 18 PID 756 wrote to memory of 2172 756 iexplore.exe 18 PID 756 wrote to memory of 2172 756 iexplore.exe 18 PID 756 wrote to memory of 2172 756 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3bdff5add2eae8ca668f4c9d8f55f5a8.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5878b963b76c1c3e22753c8607e4a3db0
SHA1d689e98d0a9f6a93ef41647e2e63aa2f4cbf7426
SHA25694727888d9d4b4406bca226d9caaf6e4e5e47f81fbbed94c62e7a32c7a1e46b5
SHA5129581fce5cae460db159e77b849cacf3e8d9be6cf1db1a89350c15ff3cb0f579fd04b7a12ea11f5835749cd556843bccd0ea9da866f7ef27bb33f21b73da6a0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515a4ab0ceb0a2f76839e8c792783ad44
SHA1485a230c16123a2298d804dc07db77ebc9327aaf
SHA25620ff14c946ff92f6b62cdc362d143826580bf36a77f3911bf13c394ff9cecfa2
SHA5121f5b4be8e7bab7e14a5bf02dde1e1123adfa1dda34adc2c88f6c65fa68cb1f3f1b062ee3cf082cf5826e3ecd2434788deb7e1a4c0015edadc903cedd6c1435c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543fb355afb5925df4505dfcba21badc2
SHA11b7518c21902da5561a3760804b4396c6bbb5404
SHA25622f0b48960f32974f26b11abec196e8f4cb11eff78c990a99ac0fc9ea51fab83
SHA5126fb11449acfaa1dee3e2241b9560dcc7fe1fc3731e2add30e826e06892b63d0e9b15416eb866da5dd35d712eb6291dd45cf401e17c8a3f4c45728d261270c680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e15d0a899eb3268e110066bd9853bfd
SHA136320c1e7a26328adc9cd0f4270c01421787a23a
SHA2565d53f967f28c2bb070608c45881827ba686627184bd8d6a528673c58e35f4677
SHA5123d6177f14a440f645f82faa628a54e3fa28adc785104b985db23273ccff205d119d81ab32dc141176ba5a1018972491f30d98e5684961e5e41c98ea801ab325c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acc545a9344bf18d862696011a20f20e
SHA1880cfe4e1922321d7ebd46a22471c1ac0a5ad584
SHA2560125a194a792c9bb046278b15df3b49d15895ac388b5851e52d08d7d67836002
SHA512f84e2c896ffeb7de02268da1a79d1bc7af0371985af33e3a7e9d0d8ec10af1a563964549bb8213068c0fc27a983314809ae084b6bd69d82a576875f5e65ccfb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1f10cc2ee8212d237ebab5a7a0c297b
SHA1c94e91339d6095407eb02e33b61eddd432d0a03e
SHA256a7eddfb2663b0fb2b4c61533522766d1bc28d7b99e57e28d6c3933d99af7751b
SHA512cd69b71308242107c2d7f1f3f630076c928389a11a9862f24a7d1d15f373833022f2f0fb19127645270637830a84639cf66f3707651551d1a50880087ffda210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595e4443e4da382d1e1b6bf8dd719b9c2
SHA15b125c3760b1225b6b5428e43862b99bfe8b0d79
SHA2560368ac21acebffb59b7bdeb9ecb23184870332711cacd845a0408f4b7f3dd805
SHA512da87fea48a4624331c705f7e3d3afc0f31b0b938e39a14f31ea52b6d83f477eacfa46aacf80c2989a5545092c2c74914da2f087896a1298495ec616912e6baf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ac0cad0e7e6653c78adf7211d0705fc
SHA1fdb58dd3188289c6ecb6765686a465997e044ff1
SHA2561fb1ad092aaa6265452b55f6394df923c270648b728d141335438d914ede10a2
SHA512ff5b709fd3767e13eee522ba5c5a98a43acc57c11a1038c978060427cbb097ee9cc72ea01da5dde4911c3523992d236df5a56d5f6ed6ba2139c49bb0d7163cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c05b0743bee6e5ee7412656178d7bf01
SHA16736925690a7c29b0a1bf98b629904623f0e3a53
SHA25624218fb70357af64359713a2de2b5fcc446229bf4338ecc7e221013fdcf937d6
SHA5125d6758839cc292347c18b14687423337b99985321588cddbbe8b63c1ed3581bc7dc73541ac585f1b2fc6ea2ebaf875ce6d9767cd85655302d5de72b8a508a9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573db30d9887b1e68bdd628c5bd742b5c
SHA1e5fa300f8b5361cfc62e7835561ea6e0f976acde
SHA256d8ddefd6cae5890c7b5f892b09af6532fd84c34646c7dc1293d386b5533dffc1
SHA51266149f08c540025d41046a46bf854ca294a8a3ac913fd1b32aa5685f31d74f40bda7c84e6d5defce6d1a346f73fdcddbb654ef947c854346a2a3b909645f736a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eadd425c6b14fcb6ac429d5a2545af88
SHA16109308220dfb5c118b7c117db375378603e82f9
SHA2567d9e21d6f83bb0517ec8c0fea92aca18ad8a1b86a28426a339eff6f596f4f9a1
SHA5126e3cd2853003b306924737dc8d90c74a5951f4d1f8d5e03a4a4c17d88fb60a3a90e310ac2d04076b673fd42e046e8c47877262d96e4787c7c90ec28314895cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de53906e3c9a1b5e0a8176b2e08ad536
SHA1c517f7f42af839ed922f54a9e1254f6bbe613c1f
SHA256ca69d47c08c6c36055e3fd72c0e528016ded02cd7831a7e4038e52e7bfc4944c
SHA5126de0c772591b911a86144aaab5d3b31b7b06b4081ea09d8e20b3047fb2269c298f785474abcef970256f1f4649f19618ad3d91d9d727a8933658858969b32cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561cf22ac5b574aefbfac749bf4e2d6fb
SHA10729746110a09b73723966a9240bdf420a3db4a8
SHA256d39cabe3f8038b4fe8f779c751f42f8f3bf0a9cb04f04e39f78107a8c950218e
SHA5120b940005a136cb5c90737aa7e4162b46dadcd0520c0ad4c95dadd1ca18908eabbe560fb6b4c072cef953c07653af387fe4c20094cb96a56ecd2aed5bf5cc3f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9d1e27e8dc977330dec8abeb0432462
SHA1fe69bba68407bd597ebd3dbf494fff6bd76fb06f
SHA2565eb40fec574f7d9aac1dc8c2cab350f5e3f68b6dc22b5a6ab1b5e135bcd7305b
SHA512dc1f5dc0a57eb5ebcc955eb86d4402ff8f281a29d105787661ab752f098ec5d8a0298c74d5b61608bb7367da58b7db054a4c945faf10fb66a8f8d2cc2c110825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53c51c85518b3e4f605b70ffe64a03c60
SHA12f5b32dc909e511dbedcce751987aa67b8fabf89
SHA25686091d0d8ddbe62a9a952adf29fb10c85e59d888a212aa024c594a48d801aa74
SHA5126b33fe379bdbd91321f6b12e07a3a8f752702b484cf6072573de8db67e0043b0f24cc5b10587dc0fe12a151142a3817fd29dade9039461cadfe5767263e3ee3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06