Analysis
-
max time kernel
117s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
4613f4e3e5dbe25569b6d37f3afbd11e.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4613f4e3e5dbe25569b6d37f3afbd11e.html
Resource
win10v2004-20231215-en
General
-
Target
4613f4e3e5dbe25569b6d37f3afbd11e.html
-
Size
3KB
-
MD5
4613f4e3e5dbe25569b6d37f3afbd11e
-
SHA1
6b4711b28d894f86029c9af671cd0609e20d9b4f
-
SHA256
065bec919d89d4256e97d09efc53a82f4afca4697483c681298f941ad35aedad
-
SHA512
8447b14215f3d39d756494c272c484f4f68553bda70024eb5427998d243eab25561313927e1b541eac507cba133da77a2342982e8718c6a23e031a59473c521b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000e471bca4a187f00d0d4480ee9eddc3600a2c762b17bee5ea3aa0a2dad19167a0000000000e8000000002000020000000309dc5e68278261ae6fbe09d1ed231ab203a9b0c616e25b9f6a461927327c2a020000000507cd3b626ecf470fbd264016c5adf54ff04201d63db3de231e2e2b09526d41c40000000422c5b8fcb10cb79f605e3aa6744406f892ae9eccad2ec6692452e8b67b80a9f7b99e09e7ea6ece004fb10cc87825e19d7d282a5fc99d69cdbdcf615bf978a8e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14357BB1-AC84-11EE-8CB7-DECE4B73D784} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e25aef9040da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000b521d4bf5e365bccead06ec2f945602cf5ef6543d6b905b9b2b50dd4b7376c61000000000e8000000002000020000000a8bee61bda5f8684565f21df36eb299159abd51a67996779401168df7b34ac9a90000000d0d20c4e65bcf0f850205bfd3915f92eed1d67c478477e0d4c65c42a1b0594e73eb288d95e269b6477e36b1a45998ed1bb39ab7b0ac3adff9ffc3b5844a375e25ec141b7266f26ad83107353a9713d00524b5b7d75a60dc649f973912e8c3e504a7c4c8a843c6fff17ffc44d6d254f0e3c4ec056f806cfa89bec461af3e21fa06c75ca3ea258e5f5375feb7d5a2730f5400000006b1902b73df7f33ca31d4260b2093efccf7600676d8707c70030b45a5844ace393079795da507afd0e6901da54b23bfaa6e12b6cdb06827da9b07d5d5305ecda iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410701266" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2360 3024 iexplore.exe 28 PID 3024 wrote to memory of 2360 3024 iexplore.exe 28 PID 3024 wrote to memory of 2360 3024 iexplore.exe 28 PID 3024 wrote to memory of 2360 3024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4613f4e3e5dbe25569b6d37f3afbd11e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50357e88050527f2eb8b2e2abc20ec959
SHA1c0c870de3e2fad81559994fa2cbdf2cd1045202a
SHA256c533f5c83da2647d0a7839f116a2648a47bb84d80bd47d2d853e097c1888b98e
SHA5121415ed5e6d17239a13ada809cf6c85198c64e9269364531cde36219324ea81091a90ee94e6070e0ffa57666bfccaacd29a38c0ed0466230ef55ed58ef3aa0af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d8f877a6d2586707e806053c438ccd3
SHA1853ae21488a563f1e5f4e1aaa5a7b6aa1b655894
SHA256b7878d2242e62c37a204c936e88c4a541a6e1daa487d13182c985a741c71862b
SHA512da32e5c4ac88d8c8aa3a31e9953006c0d945812b9371ec8f7aeeb4b57484f3cdd65b8e5093d014f01e7edeb07e565f08fa5fa75cb852f38375b13259b68dc4a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0f9bfe7a0dcca4f4162d50ab924d379
SHA1504bfadc27a876481dae294352444b663c5b1fc6
SHA25689ac4e8547acde45d5387e94f10a54499254e6a13704b5fef1dda5e5d90a211d
SHA512a080a2522eeeb8b4a15a98beb743e17ec37383dbe3e59e8015a64773ee1cfb9015a1f013ff8e2a65a55aca430154c6505c8d9f5c2d77279a246c744a643f1bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543f5364f100225827ff668afc2724ea7
SHA1b8f291fd5a39c550d6ef25fc71918c3a1ead26d5
SHA2561f3f145924e9cb236a5a59dbecd00ce3c8e29a129ed3766707f1c1fc55468b44
SHA5127266ac84d7fc406b97d0eaf319cab994bbeffe87387e2d1f55952ae1fbf84557947b3fce89cbab69970e47728c756ec4046b6c3055c85def54f77efb6af70df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6e8aa3596a53a2412c0d3a0d75f3418
SHA1cda2a64c7cdb04d6b0897cad51f2c639cceae26b
SHA256ee8b3bde721a828ff1529754ff3ba23330ae0ba259352ae272c33250e36b294e
SHA5128e09400f0b8ffac2b0a3c53a9b5fce01c945070f8cd1cd550325b81c5c074c446dfb517ae51d30a5509c5e3d810dd758f329583ec84140c4d6e9410210d96b98
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06