Analysis
-
max time kernel
0s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
413c19c6618f54400bcada9e3a077b88.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
413c19c6618f54400bcada9e3a077b88.html
Resource
win10v2004-20231222-en
General
-
Target
413c19c6618f54400bcada9e3a077b88.html
-
Size
2KB
-
MD5
413c19c6618f54400bcada9e3a077b88
-
SHA1
5a7335745251cfaee2df8da18dac3cd31a077beb
-
SHA256
2ab04891e932b9cfcd1b0ea1940ec41542231c1c9b7c8208c21775d645729955
-
SHA512
b12ee510e4a64f6d63acced4377c359bad461a806d9259ca1efc42c99e7dc7f3b795404e2ada7af2da2ac19ab662cce4ac6ebac4da9eaed87837eaf23cdd85cf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BAA202D1-AB16-11EE-AAEE-523091137F1B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2544 3040 iexplore.exe 18 PID 3040 wrote to memory of 2544 3040 iexplore.exe 18 PID 3040 wrote to memory of 2544 3040 iexplore.exe 18 PID 3040 wrote to memory of 2544 3040 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\413c19c6618f54400bcada9e3a077b88.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD596b16f862bb595b8a79d73b9fae831ef
SHA1d19908f515787d40a08e766de80449e5ccd34ddc
SHA256ee5d185c313797acdc634e0380d0635972d7b288c172da52d9e40d10a9103632
SHA512b4832b234f77b9d77684719432985cf111864ef0391d3355013fb5531be77910916b06453bffd3dfd2e9cda6b03fd6316a4aedaaa14e598cd83c2c533721d092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5393191227a1e42172da6d65e2702295f
SHA1a42ce6aab483c690bfde728fb1d6e0d6ac8df052
SHA2562f2d395d96f1e3c47fa943943027844cd5635cc1a9baa6dcfc804827bcccb3fa
SHA5124fd2abf72fcfed9324c9814a9dbc375a5bc80eb1d097203d1583ff0817bbc30f36da105a1ecbc63f7d4e21b815063144753bf4ba9e71d8d7d69a986c1d21331b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502f0bed3f525b1537f10a4e3349987d7
SHA1785860df44b1d4e374d45e48a2935238b0b04792
SHA256ce13433ecd88db8a929e43a4c6393523a1e74adfac4096421fcb81c637aa97c7
SHA51239d2dd6f60f1c759fdc7cf9a05796d835d94c25d637cbf7c867e43d0e79bb707f07a92361952026ae7debed55138b56d4352d2637bb8ccd35bfd43c47ba607da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddd412ded3ae24ba165121ffeec78c3e
SHA192cd590d9d3d045437fe1683c110a55a2a7f7401
SHA2568856ff6e1e9f95cb15c5e9ca1e9a18cd3ad1ec4901f35d14d1026f3b2c3578cc
SHA512df0df684b013383fa5349b1e587a2a0bfd5413f495a81e2416304531374bf83358271958e2a57f17f48de9fc13f51c8b2cc59e702c932fbd03522778f71a913a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ded27c8a8a1742300faef7685bb2bb9c
SHA1595342d716d06bc4a3c0b0dc30bdfead6f26e715
SHA256b8ed97e325758a7cb19aebed0ec36010bbb407a6668ef26bb234e7b0f0b33a19
SHA51216decffd03ae4f9fa11aee1d7043375450dadc543700bbadefedc1dc3334378457f3ec3e3e47735398f029f0cd0c34a80213cebffcb2877a8b0aacba20fde2d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5396b05c90ceabb2539f480d2bef68fa4
SHA15922ec9e86fa5eebf4c810327d2ab105dd575a5b
SHA25690c725f37d4648f721b8578306898f35353715eb8a731427afcb4129b6a72c5e
SHA5121e05eae452848205fb3faa74c240c52ba0cb934a82e0f2145effce159dfaa8ba7f8a8ac1e8f635855313d7b0af79283050e292b4e3696c570e567613f1e02b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50af7dd725b5fae66024084d92c465ca3
SHA1ea98d9fd9f8a5ea2c1c8d43baf2c81557dca0198
SHA25674d95ecebbc75827175e0bc6ef599f797eb13e3a74837dc0e41ec8e31bd54cd4
SHA512033eb2b91040178d5f9508f74f8a5169d025f643ac497682f2f6ee2cb0b57edb295db535b5c9337edad54a86e0830246441e5fa99691a1aa51643b647ea1fd1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55c5e5f36458dccfc18483bc99186f33e
SHA1f6916d681813aef964e36c8b803df3accfbe8248
SHA2562b510806294621c4caf74dbf76ff5f2fe2337e4b2f22e2b10525b9190ffb0f49
SHA512a4d9112d6be9d73b54bbbb81eae6d4ed0a35b714c3ab80fcb1333417e2af038b0758b93832dd18b05ed3dccf7e03b5b8a53726c5226e215ee1c41006d08b6afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
20KB
MD504e2b12b744bd76b9fdaaf8b488706e4
SHA12a4ad72ae64211150e922c2b1bee2cdcdc840c01
SHA256e553c8c9b8ce0c4ccca91ec74fc76061c820204c1521a7ded4c2df3d5e9fc1dc
SHA512ee90bcd91e25c4c6440ec1c37f5a2d087cae3456472067f96b074e5c00302714e814f5e6acc0b2b7cc0aa92589eab8b678c6e693db0c9baf6c0c81b8482b7f44