Analysis
-
max time kernel
0s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
49fd24cdd719a09ec1403c5e5dc82e4d.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
49fd24cdd719a09ec1403c5e5dc82e4d.html
Resource
win10v2004-20231222-en
General
-
Target
49fd24cdd719a09ec1403c5e5dc82e4d.html
-
Size
591KB
-
MD5
49fd24cdd719a09ec1403c5e5dc82e4d
-
SHA1
a901940e80c3a4e0429d37095010fddd214fb60c
-
SHA256
77b65b16de550836f8676334ae24b763f16d612d71d922a98fd8ab46724fd3bc
-
SHA512
f5040a2fc99e2e986013b66868c6d0f9e2f4a489af40bfdd3e51aea8d27a84aaae66b539ba27aaca7ecd7049013c15fd06552340ffbb7ef5347c8c210159918a
-
SSDEEP
1536:NsPuhuTFpcWXdYhnQ73ryXaJNFieZvAurhbyWU5iUbQzHE5cfeE76/RSaBXgBUcM:NsPuhuTFpkETze
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C51CD821-ADAF-11EE-BF0E-72CCAFC2F3F6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2068 2964 iexplore.exe 17 PID 2964 wrote to memory of 2068 2964 iexplore.exe 17 PID 2964 wrote to memory of 2068 2964 iexplore.exe 17 PID 2964 wrote to memory of 2068 2964 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49fd24cdd719a09ec1403c5e5dc82e4d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
32KB
MD58fe278bd8eac660d0161a869da96b8d8
SHA1eac6f73862d89fc8c49b5331cabe89b6a57019b1
SHA256e8a6de34603eb9e91ba82f555080758e480ab044ffa9c140028706f916eb2c0a
SHA512b180b8df22e421493dcc75a2caed123f7c7756295f691579ea5c426c741f80e381b4960b5cbd6b5e87547d75e44ab654d1c4704fe34b4b743a57f334bd05846c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f7a47095a86fbdc70ac552d267540cf8
SHA1c9d514f85d0d2a0963a67ff00a1a15e99764a1c7
SHA2568be50816f3809d132e5d677e378653464f1d284097c9839ca1923c4a9c741ed6
SHA5125b352881f0c19c266ed1dd39f83c7884f64a69af3ddeef17423ea1b797e08d93a5e5c47cb64af741526de1a00371ed5a3c0c136f1db584709aae86cac6ad19b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd207b3be4b09ff36d3b20b0c2cb3963
SHA130c491f1be761dda84cc68683c6308a8d496e65c
SHA256dd17aa0436333fb36e5b78b0066757206dba104e8b309f1ae9d3e1984c974021
SHA512ede800b544fca552a0734044e78f354e15f68df6bffd99fd7d4c36e885752f5871bdfb17fa58a16fb4acb54489e3b5914cec8fb00a3b3f0dbd549f32a234e324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5686a81c20486181548b3035d09db78e3
SHA155aae3ef203ccd3156740e1a1f0dd86c39e227ab
SHA256a805c34d034728152a2348598ce458a4fa4bd076187ffc69f2a47de98793e594
SHA512aceea4fb5f757d02767b32fcfd492cca71a1d36494c23feec8b13ebe874078a48b71b4f01947da8fb7695d502b74af8af2b65272834ed9e10e5af9f5e62e45b4