Analysis
-
max time kernel
0s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
3f9ee9b53ad768cd321d2a23e90f85ea.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f9ee9b53ad768cd321d2a23e90f85ea.html
Resource
win10v2004-20231215-en
General
-
Target
3f9ee9b53ad768cd321d2a23e90f85ea.html
-
Size
432B
-
MD5
3f9ee9b53ad768cd321d2a23e90f85ea
-
SHA1
a5718b9bc08c47155e8fb05f31f12abe60237847
-
SHA256
8ef87fd03e63eb2630d2750d58381976aa26850bee4568a50b377fea6b41ebc9
-
SHA512
b7362720c346da7c694879f42dbbbe16e8eb124f02c37aeb05217e427d8985164957a56581cdad25c73a49c3585e4d78a1d9bf6cfef917916b0cd717beafcfda
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A95C7A81-AAA5-11EE-9A90-DECE4B73D784} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1268 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1268 iexplore.exe 1268 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2256 1268 iexplore.exe 15 PID 1268 wrote to memory of 2256 1268 iexplore.exe 15 PID 1268 wrote to memory of 2256 1268 iexplore.exe 15 PID 1268 wrote to memory of 2256 1268 iexplore.exe 15
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f9ee9b53ad768cd321d2a23e90f85ea.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531fa77b44b26cd3f1c77b61988b2b922
SHA1582677123434bfb2e06b7a2cf634849a3aa4c3da
SHA256251c45cfe7dac690a2356c5470be2162f112d4ca0c6c2a7d0663bba7db210188
SHA5124af45c4fb022d7a8fce3d06fa4a60003235bf7c9725932b21154e62ead20591777e771cbbd1b00817dd0cd575b1ec00ad727dc32a54dc3fcbffd427541586c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505e29d9f91400a7fc99e95b6e852c211
SHA11138e1cc56c0aa5a06da17e9c100798db369c758
SHA256f6bb05b9c98e7957ad51c4f1f6e642cf8df5a208e05f84d19aedae851e7a66bf
SHA51265949c430e940b6e65c1883bb0aa4ef3220175b53f6ddeb58fcf7d50668ba94a258bf61b7959f0b6af9995fa2e9da72d50fb7ec708571e279e22d595e2649fb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5757c6285c4a2b102d011892359a2102b
SHA123b521ca61167a85142c1977cf6f314aa1e7e4c7
SHA256beb72f1deda4dba37bf45fa2670c9b8482ab53055317bcd243f3048926f0d430
SHA51245d8fec6586ebf5762c14d5e0b0f566e1d815496cf55626d43a921044cb75e7479234e01bf8cb8c09ac00b64c9c56ebc7f83f1de86f1a204a6c8e29686c7ad2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52502ed7694e91fe48fb8f85212410b8d
SHA1ccca2701cb517c8de03bdc6f2cbc14f4e385c508
SHA256c1a415552afe69755c26fe35c7f2bdbb33aa4f13182204b6169b7b62f16382df
SHA512ea567a4e3eeb1a7cf2629802906851dd5829555a5409e9f33b5777b1951aed26c4606306dda8891e04bd9c185306ad00a9b507c9179802a119ee7e65a3c11827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b74ef4f1f736cfebccf4b17c0b8f346
SHA12132e63648bde4f55bf86c644e65c85a53ca5f6c
SHA256fbbd40d1e729a1b46167107d4a3d680bf4c9c4fe23842ae2e0abd0e2d95901e1
SHA51286183635c90353828a9846a774bcd730a8de7c3919612d510036dcfe00f673f0871e2551623cd27327d601f1ddddc8b96fe9ebf63264de9cb1b80de295f0287d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b758c361752d27ddb4bf34f678f72ef3
SHA1b56d16f969f2545b74b408c1ebc6a88f98cae9fa
SHA2564d510a6129b2876c48311da6833d0db978ff444c5611800e8a6bbc59894554ca
SHA5121f1b6b470d548930b564c43be9f773fefc12437c4576fa0c95531ee14a0e82a5aae9755174c959284b10d5de93bb9cc6c353509e1d16f839b744d72240cf9205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571368d324423373466cf38a03b4bf61c
SHA1ff679c25552230a10b5ca8d8e5a1a279b662b955
SHA256aaee3c94b8f840459b52e2635366673e93e1f8049922f4f534e9d3ea50f71f5f
SHA51242f44fe174c6ad95aaac3d4fbf6c8ebde97b2140f2861e93ce775a22805b841ceb143b3ea2924bdaf9273a1243398b0a8e570bbc17cdc2dc41d9115647b0856b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4c49a6cd78330279b77acfb0b7b3021
SHA189b4c5b2d2530d394d497647f5471b3e49120fe7
SHA256fec3538ba5c4bfc17650162c6a988d9d71f5a2d45113363f02b76b1dec8619be
SHA51274ef24cb4b014ae56f6fe080af1c43235b4f6d56bfc05495f4ff04db99771c11b2b482551e5d1277a47d08808b8bd7299a034261e0155f5b25081a3fb5190f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7a083c13a2965c3f1f9b67c42da3944
SHA17a3576d605e5df1a4edb0d931e8c534f2cfc49a5
SHA2564feb21c6229e97324099d6c82d6d45b8ce0dc09133b6821155d442c5cbb0179f
SHA51257c1540d18290b8535a2284e9bfa284db551d6064fdab993a97e3d747a18549329d7856fda89b83cee1790e4b00f660ccca2bca307d1ec9784f5c90093d502ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f7a92a3a59088f086137886e6dc1f19
SHA120a81cac7df8850b05b4748613cbdb2ab31663fb
SHA256ef367cfd3f4154c523e6db465cadb519500f5e8a4c2017972ba8d4c73fa5f1ea
SHA512131b9dc44652f1d79e12c4708accbbd7516917db0345fe8f0bfd095cf6eba5dd7585de1e0260d4427e0d589b31d32de566bfb3ab14274efc1d37a26e5c7edca0