Analysis
-
max time kernel
117s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 08:33
Static task
static1
Behavioral task
behavioral1
Sample
3c620fd07fd9ffb6d9a9028e93017cbc.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c620fd07fd9ffb6d9a9028e93017cbc.html
Resource
win10v2004-20231215-en
General
-
Target
3c620fd07fd9ffb6d9a9028e93017cbc.html
-
Size
6KB
-
MD5
3c620fd07fd9ffb6d9a9028e93017cbc
-
SHA1
778cd8f918faa2d222d96f96bb9578add1858a92
-
SHA256
e6cceecb701935d7ff08764b82e875c3432c2013abf24f216b564246f6530868
-
SHA512
50cb128a29096b2bda6b866b863e35e9fe026e13309a567cda37a693a2157e25ff7f80693d05832238c33425a3195d911e471f0dc18ca300c2dc1588332a168f
-
SSDEEP
96:uzVs+ux74edLLY1k9o84d12ef7CSTUeZcEZ7ru7f:csz74edAYS/9b76f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C8E57A1-B021-11EE-BE60-EAAD54D9E991} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411098575" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0882ff92d44da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000763c0a4ebeb63f59f8502d940d8ad229fcf87b088366e9bf0d0db1f67caf278f000000000e80000000020000200000003144a3cff4a32e3f75fab189e7384dd32c519ae73954cc510e8aff663e749b7420000000012653de9964d4199fdb914be3b1a4d8e6ebb7c8b6dadf698e887f915a4bace640000000c2818626f21172cef4bb501b97072f9d2529b547b26044cb2fd7053f2731a60316ead784d4107539f627fc97e1ab0352468be6c39c2d9c0a71902164a2af68af iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2280 1940 iexplore.exe 28 PID 1940 wrote to memory of 2280 1940 iexplore.exe 28 PID 1940 wrote to memory of 2280 1940 iexplore.exe 28 PID 1940 wrote to memory of 2280 1940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c620fd07fd9ffb6d9a9028e93017cbc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4478fa0b0b987b1d6148088b3c757ec
SHA1392866520d2ec4e5dd492d0c7c4fd2dc9d7c8fe7
SHA256b557107f23048a030f7aceef8bfd665008d352e1346bd84541db9fc460582f47
SHA51249b1b5a2f12bb69210fac33c9d35acd8f01823c14a5e2026035b953608a5eeb69aa77c0218561ed543e8c8c5ddf961a795aade3e529aedff7c1caf166efdefa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c88af6e8f8af65180cd3a433317bd99
SHA1733f9e6f8a5dd60a4db45e67aeb00e2e10e15a4e
SHA256fff0be24767278eadbb10ce60edd4cc4ec7b018d4871f1c9abcf5b346648ec01
SHA512fe4046bab0be9f9f4932373de3b5398fc5fdcffe699340c2088684550f0899952b3961e988b246abd5d5e4aada8512c5759c6b308a7729cd80aab63633cd42f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563d4397d0a95a597657e17ad2ee78273
SHA163227c8f4fa8681f38f5d43019e1b2c1b54a0dae
SHA25601943406741c4842f6b2f196b23118fc3f77ca6c5e58818913fdda38cedfb596
SHA5125a9429c4efe79522999b36c26ba8d1388de4804e48de45c979f911d5493acfb00322fb83e8af1e198a88c3c09980e913f98f2cc8053ba8322a204a8c762d98e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3978c877972bda82b8b2446cab04eed
SHA197860d962f37cb5953d9ab5cb3d3e7160aea60ce
SHA256a12a6a96556b1e6b81dcd27b2b5b012c840fba5f56600a85d9261d75c4b8acac
SHA512b2cda8d99f3368adc4561ec167347aa4bad1e38119fe7707bff62e691d98ff549704afe49418d8dba35131fa987120340a49c3fa5ada22c6c3243334448f1118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59af01f807be9f86407751e0af98f0917
SHA1c3e6c428e8e76f9e1e20df97af9015c9c5544203
SHA256f085c1d4641a1c6666e61656013c53fd75d29de3f8c5b8b9443cc0bd3ff3baea
SHA5124474cf9bca2827c1b147a8e7ab54ecd1a57aaa96132eb8456cbbf8ea2d32664c0b4251ee88cc1b398e54c66f31fa1db1753616dd70f88bdf5ab45d36f4814d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511cfbe8a30d4621576ebdd7f5dc1a20e
SHA165c78ea06010349491005312db4ef188bc580689
SHA25695057c6ef8a4e127b6841f7e4a2c49974bd8a6662afad58dc5d1f549f6561ca0
SHA512e5ab2ba6ca4f8013e8bd93fdeae8e095238425fd4b8817d91272e7a3a8a541a5bed180a69f226c8ffea58dbf72202855612498c9ef20e399677bf9e80047fcad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506b4dd09184413b4d01228e7ca620941
SHA160aac0ff85db8b1107737b51ccd1e94ef60108a8
SHA256da7420b309eaede0e302d01aa0ec1d679a61eb1dd91cd396070b98b468d0d418
SHA512ee089d7bd22b78da01966a2af631ac626b9432eeba735ad7344d0ba11177c4f5b0e8d486226c3c13663f77752e30e9619d10998ce2b6bdf0fe01f269a4affe54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510611e443e345249c962c97521f12091
SHA12e3c1ffc43aae6d2e347bc532b4ac2d487fff535
SHA25615b8e0eb42643448ff83b0ecdb47e3501f8964423749e4ca94e77a07e2ef5a95
SHA512aa2009e9a3fc303a316f7a6b8b9abb16888e4062c99d772c2ae3b83aecbb6ea30ae795a240858284f9fc7e03abe6dcca131e90f804beb226f512be0c7fdec396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7bdfc1d97ebd3f89ac1b400e87aaf07
SHA19f93f3329742c2c1d8711e835c3dfa916314899c
SHA256377af2caa77a6f230e1c2396165c33c12f040772f6ebf1e041876093bba0f3fb
SHA51251bc08014d2c75cb484273c19e80a46c91507c195be04645d1f37cdc069116a7d741134b1342a2a5c0d7ad6decd6e14696c7c5fc6851a2003b94d2e37a9aa911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c622375efdb5930cd0b0a8e944d0977
SHA18e2f7dc7e7df03d87c0e965e975ab441c99727e8
SHA2565291ff5b1dbc63940b5fb3b6f21b9ee02470911d0fe6e04a01b893eba9718aea
SHA5121f1716a8d9a86cccb23515eb03208f83d6cf8b5e6c195e5a189be69be066eb5a3b36f197cb15e889b0d6ecd3d971ac806ef24df218e0557d5acc66d480430615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58247e8801feb64273dcb9a15fef84f5c
SHA170a822ffe228c01e882819e97fb3066a84f6b7ee
SHA25650fff9f804f319ed537ffb212e001656b5824b76ce69ba593a6fbc7e81915dc4
SHA512e62ad618a280971f4252a23da98b9ae37639202044730b6a79de7d57dfd9b9003941246e10935d2804ab7f982844e3c17c0099fb1c248d825db976155c563092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be898707b242c3d2283d06cc8ec69897
SHA14eb71fc91d91ef436d5d2db5025769496429b7e1
SHA2560e61b69ab61364dd4c47355cc2cff1d4ef1b9de9bbaece016c7e4707b46d2540
SHA51222b9d18e45438f5fab1652253749613bca0970671d957a4831e679b9124b8f268faf619a90b1d190b21bdaf253916b8d654c8e3262592ab1eb542eb8de2ee950
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06