Analysis
-
max time kernel
128s -
max time network
178s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
49542dd73919ac812e3eaf548f36957d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49542dd73919ac812e3eaf548f36957d.html
Resource
win10v2004-20231215-en
General
-
Target
49542dd73919ac812e3eaf548f36957d.html
-
Size
121KB
-
MD5
49542dd73919ac812e3eaf548f36957d
-
SHA1
bdf03280955f5ced47f1b9cbcb269d1571e6011a
-
SHA256
b076c8555cf50e9f141975c1d7aabe508ecdd93f1927f956c8d1f810ecb7ec15
-
SHA512
17bf6cd50d57fa59092a10ebc435a3ed10ab976b07659fee4dca76eaa45ab35d31c310ffd256a2f45f380b8e9b6ef37fbcc787ddfa77e40408af7598314bbc6d
-
SSDEEP
1536:aKIB+U49t6ouxKIFetb24Wf62ncO9aTsIcbdYA:aKIb4bDuxKI8Hlf0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000ff69b5fa2101d12cbe63534e829a1d6b993e545e8ee222598ccc9e50ae4ecf81000000000e8000000002000020000000c4b0818468753c103897d5b6cd1bd93fc616417ac92034ac9616efcd4432faf22000000098c868c9e54f0c2b0d77572ebdaa1d6cf46b0c166b2d597d0f8590e8348cef74400000002efbe1f701e6cca118937d34bde5c72ab4f9ad76b9ec3cef157aa16ee54f356d8d9a8c2270ac8799ce37233ca404cec6144486cab7cd232a071e7f0faab3436d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802d80d87c41da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410802505" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CFF13A61-AD6F-11EE-91D2-EEC5CD00071E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000be1c3d5413c34237f82b4b4fb3ac1da90d9450c6efd642152379ade050a3c36c000000000e8000000002000020000000043725faf59bb7dea7648c94004e53e1ebd09e2e883a03352ff467d5e7d7bbc89000000017f4cbb82a4d2735d79e278f9067a4ab6fabb34cea4e5cb98870c0dcf6981fe02cde471eac12fcbe430bb822e72f262a5508e5b266b0a0318115f52b7f8021c392518764add93fb0accfe567505afaf4b16aac98b25e4ad8038ed6601b903bd263e079b8262912d5a272f223a24602630195874a482941b03cdb3ca654edbd2edd3623dcd8a16d0a57cd420b89ab26b440000000584734f5e6bc6706ae07fc21718e0c30d38137a29ed6bb93ca10c556e1275039b1d93add1151799043fd3aac2381eb201f670e64d438a012ed3dbb0ae229e10e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1044 iexplore.exe 1044 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2700 1044 iexplore.exe 28 PID 1044 wrote to memory of 2700 1044 iexplore.exe 28 PID 1044 wrote to memory of 2700 1044 iexplore.exe 28 PID 1044 wrote to memory of 2700 1044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49542dd73919ac812e3eaf548f36957d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d09869056b278989b3eeb841afd0d72
SHA142d58a91cf22022599ed6aad9b2520ceffbf2468
SHA25692c6bea579ad911cfb5fee50b03d7bf1d275a10ee1f10ecc4ca4157ea8f8123a
SHA512de7bf4fa7b45b59f5b590d3375d489cdf3861bd3cb11284bda2b0ba384d3602235e027107405802b2ce1fa3e12770c9ad604b633b5c78f4641c77306750ff56b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fe49af627274f4d8da1321d1f97e48a
SHA1300355f4e8c81ec14d0819828c71431ca5a6c370
SHA25654290731816e20314d0ebfa7562412b4a3cbe1d5c058fdd5ff39addc8db67049
SHA512e4f400675bd81e5972dfa33940eac39ef15f479e8433a53fff4b699036fda4c3a06309a8a7c9249b9f9c198b40ff9be0886a6d8871f4b496cea11cbd271ad324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b91e8fb8caa16627fdf7856f6ff44557
SHA18caef2374ede1d3ee99a594c0c457e7003c8f2b8
SHA256d3ef08462bf132cfcf580cfeaebe8aac1ab016b6dda6965739a9eb167ce3babb
SHA5127328529f84722ffcdc2cfcd4dfccbf26d2a0dae0b83838dcff0e2c8e1622df7eb3a16a691c3f3c7946adb8416ba7d1cf143106c6f8e6be1f98c856890f412e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cdb4afb7e8aa9246e599c7259945c4f
SHA188621513219366e13d00d6d2ed46f49e76c8045c
SHA256b84847fa55bf525f75a7b1001df6f1c56d7095b95bbbfb7715ec2b8ad19834dd
SHA51201dd15f1c821ce740b30f892a48fe3e5c42cb5fab911c3a473117d5ea3e6d3b51863e47afdbd25c35a919ddd5b796795d29a4103bbeeac1ffe2ff6f7093fa27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570f6662cd55f61aad9d62354737f4b2b
SHA1ae58569c87ac9bf03afb7f39863fcdda58c541ec
SHA2563aa78e21a7c8515ef2aeeeef8ead3d11279535b62233453f7e1c0108ea777553
SHA51234ababcf321dbd8043d150edcbae67adfe1ea0cfb7b0eaa34ae9b8f172c109c7be9de7d820e27fa863b744ee62cfbe9932278c167190415ae0c9400ff108365c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56495e642709649cadb5d128b96ae98aa
SHA1bb6aa4d2afd3b5af9cb3a4743efdeb1dba88913c
SHA25630133a42357f8417051d24884a0ee925020cf9d422643731c02a20bbde39efe9
SHA51245fa85474cf2e52f0fe60ea20de0efe58c61213bcf50e9c2cf557478c89350298baeb2908e6638c4976c5386797e9e82964f9aa3bd0693a7cde181fec0f85aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5285cfbc8d3fdab4af3f8997a8defaef8
SHA10929285963226ae88329cbbb5011cda3644f47ba
SHA2560037b9b0aedf9f1d0abfa1c748e90930104bbb04ebdebb9b0490085bf2ccb8c6
SHA512ad7b5ac4ed30f25d2b7f9193f49da20c5ead159c2ff44649b10c2aa35974760064672cca514b4d342281b83bf3e8ed38cd8b15b0f66a5d01cb9a608bbf7186dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543e65d5d9880725e43a8bb2ee42928b0
SHA1f089a1e69b4c9fc6972c38f1598d46848626c47d
SHA2562a67f5d836c19a94c4692863bd0f79b5774a12750921f06d80b1cf2a4de2d704
SHA51267515b0d6dd4982374829e0f1d32f7ff058faa7eba402dad4d44a2be6bf57b5425c7a4ddd92bba9c4412cbcf57d113f7c2ed65ea73693abbc34678fa7f09f2b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ff694bd8a3dcb1535b5b90507b15e96
SHA19ddb550cdaee4542adb67df86e34c7c52831d806
SHA256274382f0e1ca27e4555acba6a1b29d83221db8f8a86f9390c072f83f43d8774c
SHA51224732ec9093682dbb64fcd0b385da52af991d1a4db1fff84b203497d08c4f705be7ffbd9a80ebd7e1298d0386d5a35ad547ee35beb47bfa53a20f89195a7a9f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58819127253ff0c7f11c5142eb36a85dd
SHA13f771babe4630637da070f6aa8a319b412a3f03b
SHA2565abdf847ef6ec0c02fb3f001a8ef24418f8c1be6c02ab167d0ca8f1445245788
SHA512503aab6e22c5c596ba90fb2273980e3d0b69a3292193bedc4689f53d68485c4f2bbdae718b745d4eedb7d718adea7e36d3c88f8cd5b3c70f3f05cd41aa792102
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06