Analysis
-
max time kernel
0s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03-01-2024 20:00
Static task
static1
Behavioral task
behavioral1
Sample
3ef1bc04647f6ca878e7b43401e54dc7.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3ef1bc04647f6ca878e7b43401e54dc7.html
Resource
win10v2004-20231215-en
General
-
Target
3ef1bc04647f6ca878e7b43401e54dc7.html
-
Size
53KB
-
MD5
3ef1bc04647f6ca878e7b43401e54dc7
-
SHA1
1d26561ba7e83472b60f1f2f50d1a8c5b2824e61
-
SHA256
dc2ef0800fa3f050d66e2d7a986e27aa8c36df08a0b9c911cf5b8569817d22e9
-
SHA512
fd50a547cded863e31dc7df8727d5142d5d0e85c9dbb45b6a448e8a7eccf218b61227e17a05d50e520c0a40f501f38c51f3aaa000cc76df16073b8e57127f0cc
-
SSDEEP
1536:CkgUiIakTqGivi+PyU7runlY463Nj+q5VyvR0w2AzTICbbQoZ/t9M/dNwIUTDmDk:CkgUiIakTqGivi+PyU7runlY463Nj+qQ
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BADF3CD1-AA72-11EE-9098-6E1D43634CD3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 880 iexplore.exe 880 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 880 wrote to memory of 2928 880 iexplore.exe 17 PID 880 wrote to memory of 2928 880 iexplore.exe 17 PID 880 wrote to memory of 2928 880 iexplore.exe 17 PID 880 wrote to memory of 2928 880 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ef1bc04647f6ca878e7b43401e54dc7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:880 CREDAT:275457 /prefetch:22⤵PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD523246a7cbd017feb10bf284c1960b742
SHA1a54d9b7c083caf2fc82a87856482bb1d74aaee7e
SHA25632e0dd76484c7a0bd9318eda92795804ba7bd1274b2d5a584efe9abbe6f0ac2a
SHA512569542bd74f066f349208ebbb14fe3017ee6335f9672888f14242eb6136aed0eaac0abbb680ea9c3e5b4a5f79c97576b7c88f0d81b7ac73dbcacba411dfcef9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d3663155428a400588851b00af86e88
SHA1d0404f9b3fa81ce73bfaa615025d1431cc970af7
SHA256a0af867960a278dc7586b6b0ba80026cbf954e73870aae1c7441f9c2cb180f9e
SHA512adde695f9720c1159e59ddf1268fe9c0ae550fa897e7a9a35429e78704dbec8c03c5127adfa0c26c4f3168400c2796a27bbb7575605cd50a0b323442d914f51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2bd3ee8cd6b3429f0334a5d0b0e4e9d
SHA1308d6fc65fc7132a37c36d48616bb851fa848690
SHA25674bbe31fc5a6968e29a2d3e9785e9750467308773c7d200477693641bf442cc8
SHA5126064ffd054e7c1f89850cd5509031633eaa9c6327180ca422f4627e5d9b02e5193115164e3ef50415801b1a9777983b19ca42657dad12e8dd40487c3d2dd2fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef147301aa91969d4c3ca0ce818267df
SHA14ebcd13a2359d53b14e8a1c11baab366a8cd7e80
SHA256958c3100f0c1f3582cf11e86ef75ee95c527d54306cea81a4d7b53a2111b935a
SHA512a58ab2011e0d3e1255398c034a77bbb6ed2f95894943d0bcc395c905aff601ecb53941bd6fc9a82c3e6cd0527fef72b3dcbac611276433d32b8cbee4d10771bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f16e2dba255627228641d4c764547eb
SHA12edfe8c5c4e6a8dc7826901e5f33c6d8fd8c010f
SHA2567f081fcb44006512f4cfb0684a926591dc580e8cb1f6b747f82713b61c5b943f
SHA51263d6b36bc4371ed923e4b97a595c2ab515fba166d966cead4cfa4ad20a6ce3426ba6d6c8c8bbc3c1002ae9288e930eef4e6f233aa128c43dc488269c255248ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5878c5a1e2357efaae0189f49da5e4f
SHA19f7325b05b404e0f38e8990e278149a6996e0a07
SHA256fd49d67feaa579c443187ebd312adfba1d8fc97829dc5296b5cfa62d03e68b9a
SHA51224ace162447c7a92646d50759b4e91e6b8d1fe93901d18e12dec09a8712d3248483fd7bb7c8a4df292df5c2f5e265d7aab7276bad752250f870b93b35b27fa88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5346503c57b1aa8a42d6adb0fddf1e42c
SHA1247951dee4735fbb19e12d3dfb2c6e590bd40ff3
SHA256d451b4b7e7117abe97c53dd751172bc59ee6c520beaa337f1db2ebf7368435eb
SHA5128959995c7af08caf40122ee404450e922a06c7ee52db190812cc66ba0a723a2522fd1457e8abfdd2c30299b39410085bec7af48fa429e6c3be81b7b79a6be323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6f7f27d36161e4b7db81c1f61271ab3
SHA13c04da89ebd604db23660b41422581d39ed05af5
SHA25691850965c195a6a2ab0d7270cc235da111d0e03041c072daf9a6c79b0918bcd4
SHA512ef70aa9b6a837c0b5c06cc311d889c5c936d9586bab3b6b5639968a76a3ce445aea503a0fa41a68ff3dc77fe631c78a2aa4e956ed6d50a75c9a9a2218a065a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52593bcc09fe545ffd9d7a97d7565c532
SHA1ee6437a2d9c2e13e2a9d374b6d199f2d7aec082a
SHA256bb84c14da83a4fe7ef4a61a8065a41593bd36c5df0b1b136a091608177c67f55
SHA5127baa2c5ee05266521a041180a9a6985ad3049dae75e15b2e1b74b47e5b49d398de3900806fc50c16b84bcafcd17e57b7b5e6ad934b0ad637a609462761ec8d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535b46a1f42757598604639b107ea89a8
SHA17ced171083b4f68dd7ac8247426cf8928d05a938
SHA256d5669c4fdb2fbaa89c15e708831e6e04791e188d71c3e092763cc69cd8ff4302
SHA5122abcf3032f898519739ba9843bf65a003e2d6bebcde084edb06c5f759478f1d8c1f5f0bcd97511df0b1b789a8513af80808e2b2d2bf5c3d5a9b1a89bd2bc838d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4d69e7d8eb553e84ddba1cff425342a
SHA17fe0b05a5e9a1e2e44321f5ad43b34be4985e79f
SHA256bdf92695e4bbd77ed8558e3db83aeda2b7b1c04084b0f1738f3d2b26a952cde3
SHA5129d62056085bea7df6ccd00f5e528e0db400e8c8ab3eeab70d9a90ef749b489326640715e478ab18629c579cd4d131b93afdfd3094299d9fcc83622ddaaa4e6be