Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 21:50
Static task
static1
Behavioral task
behavioral1
Sample
49dbd54398315135858b1ded1540da6c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49dbd54398315135858b1ded1540da6c.html
Resource
win10v2004-20231215-en
General
-
Target
49dbd54398315135858b1ded1540da6c.html
-
Size
1KB
-
MD5
49dbd54398315135858b1ded1540da6c
-
SHA1
8f3ef46f70cc27f0e3f6299dc70089a3f17b2b0a
-
SHA256
6060bf85864116e2cd171c3d27261fcfc319cc21da243cbf886c73213de07edf
-
SHA512
0d29a2401b150db32f5508ccc2e8eaa213b0f0638886099ce8dbcb5f434c89177b860d16ae68923a344a7f94ecc9016bfb4ff5cc55a9e97ae1d48ecd4473df0f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410826096" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d300000000002000000000010660000000100002000000010f7bea5c470fdf15712ffbadebc42261ab4e414db3483b95ea20e596e975f17000000000e800000000200002000000025f360849fd652d931444f5924ae88af30314177c4c3305b1a5a4c944833b6c6200000006ee15721d05dddbff371aa4fb8d12db51a7cb7cd2a7e621dcbd20d2ee1f9347140000000d27528db1e8c78da45046e085045c2ca8915be6b90b349e8ebd423410aa5bb2674f2250d87998231554f7d840781d20c34c7325301ce2cc0a45a94a08d0f30be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BDCCF3B1-ADA6-11EE-A908-4AE60EE50717} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10804a95b341da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2752 2496 iexplore.exe 28 PID 2496 wrote to memory of 2752 2496 iexplore.exe 28 PID 2496 wrote to memory of 2752 2496 iexplore.exe 28 PID 2496 wrote to memory of 2752 2496 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49dbd54398315135858b1ded1540da6c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56efe9ead9a440b51cf6378cf6059b990
SHA1014ba9e5b522b50b41d269440026067b4ffcd54d
SHA256f286241029a46942c8c46010ecb9369032a2439604289215cc364fbbe8b9969f
SHA5125c42207ee511fa6200c01fad99f34743028b33308072b58aea3c6516dc4d9bf1e1015536efdce75878c5a970d66bed97be5faef08b0a92b7856a99b1e961a155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d47020b6b2299573fd2fd90af105cd8
SHA178db29f79d1d060c7c75e1de000bcc2f4bd96b45
SHA256012b862c14dae60c64f5dda892dc45f572e69824217c72fb84f03cbccea2fe34
SHA51232257707051f4a2136c4ae3b695a8bdb7696883a3deff069933dc2dffa2fa4b7777bdf8f486242f8ae046c566712eb38ad8c8b22a4e87ca470bc732c4c53dd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5369ef618265ab4adc0768c544cde91e8
SHA1d8f8edc48be3aa59d3dbaf04f9e32f726cd4949d
SHA2566d6d6bb1cc3e7c5fe75a348d6e48497a0c092cdfd527948e86599c5fce2db69b
SHA5123a8f23d37117481d47a78f56919c67b175dd9556f4ff6ae6dfb70fe5aa7ab78b4a8df474c656dbdfa2ae7b528fa7bb525edcdee5524d313cabe38612a2a6342c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529a47fc3e76f3af946c50664e35808a5
SHA11568240cb613f6203a6583061a4c5802d43045a1
SHA2561416aa40c6845afa8d8d26245b1ed7dadcf576958f34825a8a970c33aae434aa
SHA5122636309cca871a45a898dfd12254fe9028184ca473193a4316fd72a1b0d542a0e98ccd631ffa117aadf8184fa096e47ca6d8ed8fdf476ec857f5436556e61f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56382a23e92305036885df939c86bce52
SHA1a66e336913e8361f4c871021f9f33f67294cd2ef
SHA2561357539acb6e95c7cc80de6b700161d288a387b422b14e601bbd9074b01c3691
SHA512eea39ddd98ee3160e94ae839a04c8c2a63ab3adf63573525f3c8fe744adbc277e7bd40aa0bb0ecfe30cf74effb672c831d905dc560fd750323e658a36e4c4a18
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06