Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 02:21
Static task
static1
Behavioral task
behavioral1
Sample
42859ced7c073c0a4521070a8753c13e.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42859ced7c073c0a4521070a8753c13e.html
Resource
win10v2004-20231215-en
General
-
Target
42859ced7c073c0a4521070a8753c13e.html
-
Size
60KB
-
MD5
42859ced7c073c0a4521070a8753c13e
-
SHA1
4d6c5d3c17e31e5805e2758fd7fd0b510140e4f8
-
SHA256
9c88eb041733edd5cac5c42122722170e121a2d4c5e5d681266be36db8c78c99
-
SHA512
e322b12c8efa0be157e5ea14a0d32422af069f22fef3766dda86aac3edf6ef459793999527f8f40de1f22177f759f322892238be3c255c3b676da2ad085bdd95
-
SSDEEP
1536:JIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZMHr:sMH5FJsMpoUsQJ7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3157DB04-AB71-11EE-9ECD-6A04C5405167} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1556 iexplore.exe 1556 iexplore.exe 4560 IEXPLORE.EXE 4560 IEXPLORE.EXE 4560 IEXPLORE.EXE 4560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1556 wrote to memory of 4560 1556 iexplore.exe 15 PID 1556 wrote to memory of 4560 1556 iexplore.exe 15 PID 1556 wrote to memory of 4560 1556 iexplore.exe 15
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42859ced7c073c0a4521070a8753c13e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1556 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5ef0413e6e50d0c4cba0f5b5af2b238b0
SHA171b40bd1131789577e3783e22c80a081c5c55a7a
SHA256580f8daf29724827b00d2cd5650d0d5730bb7b379b7201ed3032d9de7cc33068
SHA51236051ae2e98c094564ee3338b9cbfe6083e8f9e1048c2157e0659af028d5647cd163712879cb1bf55ad619c3c0bd76780a7b6f11f26a6577ed6c158b43b076b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5080f3bd4a630cbb8eae11e52d0bb188a
SHA1572b1481b47f0a872f1102f1acd599f47cd8784c
SHA256fa039e6b558996ed78dcec409ba9968bd61809f426da8bb88878ca4193d355e9
SHA512ea203a949f6945cd2e54432352c8d277d8749c263b639eb31af0302139d35ff58619a3c25ed2966737ac2ee9eac1132a7652fdd634c8fc00dea7b24e59192957
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d