Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
442fb26f522a7516538454e5130c7ae7.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
442fb26f522a7516538454e5130c7ae7.html
Resource
win10v2004-20231215-en
General
-
Target
442fb26f522a7516538454e5130c7ae7.html
-
Size
87KB
-
MD5
442fb26f522a7516538454e5130c7ae7
-
SHA1
d350ab809b6865b6916438fefe2665a410a44922
-
SHA256
9544723e186a059c34917c133bd6037cae3ef02f38b69fe830b62c1ce705350e
-
SHA512
d90100cf3db539a18ccd9638f1949c1d990812f9294802f01cb81181cd4784d79d1c21423cd787698fb9dcfc6e1b5c0fcbccedfa7cf333faeb46a184346c23c2
-
SSDEEP
768:So3eyHHvPWd/HSnuPT3kzUiY0MijZr74tKP+orWduXbt5hz2SSWsf:So3LHH2d/HSuPT3pp0MiNt5hA1f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000002e9557878f2920144cc28bcbdc787aec9b6be8a583a168d54861b7c7c361918e000000000e8000000002000020000000b7159ed2bc580e6cf7f7ba8356a49ee0d23cff2b88d5baebadb25ff9e79f2cac200000003a27ff313c3e0debecfc0d5009f59892e5eaf1caab2fbc6a81687b21de37b2c440000000be159d6a1a924ebd19cd75dd5cf216d22964b761a2557e2a4d862324fd5e454d23711394538af7d2fd2108ea9a140857640d30a8ac4a5bdc0496b5117c55c102 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e096d9da0840da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410642817" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F9ED2791-ABFB-11EE-A3D4-6E556AB52A45} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2828 2236 iexplore.exe 28 PID 2236 wrote to memory of 2828 2236 iexplore.exe 28 PID 2236 wrote to memory of 2828 2236 iexplore.exe 28 PID 2236 wrote to memory of 2828 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\442fb26f522a7516538454e5130c7ae7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD56e5adea02c6e2f689d534d0a0dbe4910
SHA1ad43d9cbaa402e126415aa0769c9615d708013b5
SHA256b16a5dd2c91e249ec7e66832f60a29ea4b7811751427ca6fbbcdfb325b9f8c09
SHA5129cf6769bac1bd55dd6bb414466319abf5ed1db82456fa60747f3665f3010a1a0dcebe4b38db6808135eb5d6a3a438e98df7c24999da464324dd78700b64cab9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594a9743f33a7de3e3528212f038a62d5
SHA1ed6b696f231960418829b968d481945bb072e0e1
SHA2565fbd2499d39c638f07d92898903d3c330b6edd3ca3db15838074ee420243aacc
SHA51224875942e5eefb11a2494513f06688f1117002213884a6da1d7897fdc6b64b2f700df7e76d986861166c161c4b06c3c8e791c77ec0d16e202517fac55439c852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fae07ec1bd8ff0025ce66c2770cfa52
SHA17b8e91383ec07686a908bc538bc14913622c1c20
SHA256f9a56c587c14e6f03ca244ae73cf74749dc0f11bad3d9c9a0a8a8532a22bc2b9
SHA512d1b89556cea502d9165f8aa18ad27f595b7b8bf0e1484caeadb054f3dc3b5beba40d53b871682a90a7e7ebfd0c97f12819b55692b5c7b960a39705e319330bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59469ada22424ac1bdd1615b42da53275
SHA11fcfc6a65205532cdfdd8eaa9c8b29c5324cae96
SHA256d6401bb4c738f31790f38a3a34bd5e6863fd5339c43386ff29b5c9ee7b0ebc44
SHA512f16e451e49506cb1ab386d9f05609a0b48037007754d4da7a73dc806458370520b937f43092ee5e5f962ee9dfbc0028c4c8c3e89425ac7470b012eeb28002267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d14c0ba30e7a514c7ea948654a0e82d
SHA11b8ca363b04cc54171142e4df46633b323bb3a82
SHA256b1721ad0e5537d2d33cd66b3eaaf2ba6b483fb901625a2cde17a92899594feef
SHA512c613cf1b5b4f95e84ed6d96ee905a1e3d8d4650998976265cfcd3a000b179eae68c302762c9f1731362b922611ae636601e7cd26ff2d25a7247030a93e454d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a48906f2ce59706d9c43dcf199480fcb
SHA13bce34310842458468ae01fe4343d74b1b33a399
SHA2565c542f1659ec2fc0dfaac4792a66dc1649805c4b391f4ced6a1dd363e8923ab2
SHA512898ed0df189263856b4a50d3a0b3bf65c0ddbf4d11fd93f9dae9e93d6d2f5921aa386848e5e9ce85d82948b636ebb6103e63edb8d440ee23adaf2b3543da0c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a22134d6f375f6699d014da7627c965a
SHA1ac5c1572e1b8fd47d47fcc47770a65ae371fb337
SHA256045cc218c3013bfd949a3de7cf7638a95a13dd04cf27317cfa3942c4b6f32c46
SHA5123877332dd9cce4432ceace56d77ac1066812e3e44c0fa8c678ca20eb0d9651f7f2b0909217c188f646ce06d5f1a457d1a87d4b598078b127960e75603442a3fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5336cbddaf0f7f605677b3b888d71605e
SHA1ac7a43c0db78045935c5a7117770800999b3d66c
SHA256a7e86b8f34031b8a4c3de134efc0482f8c2031c943427fbc83510c7f36fb847b
SHA5120e64b1c0aae58dc30a6e06ceb0cd86561b572ca7cd6522c8a06d620e1e55713a9ebb0292a4f748d4c423e5663884dea7a6850ccdcb1acb7d87af70c0c9d7b0ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f896aeee34e3115c97d720bc63aa4b5
SHA1c73394d41f362d9655a488d6f80c91aee0d7d9c4
SHA256e88629c9efef02ac4dbdc4f7289020f9d83d7adcab4b82ce2128ce6278c4307f
SHA51287c9d7b61167009c93cdfb5c5bdce7c8a96af88f3278d58a4665e491877b3950a36c1efec56b7f9794ee1a72834ed7f89ae171f75679b49707b716e65483bb7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3c1d8cc88df0d1b8fe6e9a17f0a40fc
SHA11730ea881042e1e87432304779f8f12734050215
SHA256bf53031719518917a0af229dd4c8f5692eb4cf7caea9496fc0abcf9510d5cc6b
SHA5124844e1f66b15eef676908fc7e66d06a88d153f1829ace112aa8330ca50376eb63d86b1d454483c28b183220876cb1a0aed834e76684dd74be00f460c1ff9d329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7a49a9533a997088b27fb1aaa9468f6
SHA1d09bc3cb3b95bd1fd8dabe737a1e3ba566d2b491
SHA25698188381d871b8e16f870644d6a976f9762c2296fa727702372792784b3f5c33
SHA51238f2f1361c4346be9a7364e51f502ac1f1b67bf7004e265f9ac03d6dbc7a531787eeceb371f464b518f713b8a631646e98681c6ab6961fc2f6313ece16ebf1a4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06