Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 23:31
Static task
static1
Behavioral task
behavioral1
Sample
4cbcfec2ba039237aa01778192c6c03c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4cbcfec2ba039237aa01778192c6c03c.html
Resource
win10v2004-20231215-en
General
-
Target
4cbcfec2ba039237aa01778192c6c03c.html
-
Size
12KB
-
MD5
4cbcfec2ba039237aa01778192c6c03c
-
SHA1
c5b919a01e19460ab95320d03457f958210e1847
-
SHA256
5633e90d2252d755dd0d9ab6a570df848b55d07eb87d1a7e971bf09f64f15c43
-
SHA512
a55f1d497ac953de836a740874d64b76c40cf529385ffb54d960015ab92a978a811c16fdfc70ad37d98dd6046acf8764b1c56990a59c3f0d77aee94f84673581
-
SSDEEP
384:ooCIVRO7tT65qQOa7YFW25ypbuwh2fXSb9lVPT8OqcFbYXnIjIF7SduHX:hVKW5qQKj5ypiwh28VPT8OqcFbYXnIju
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000126cb7d110e7a556d8db388a0e9ed6794022cbb8d1f9f4ea033b0a1349604ab1000000000e80000000020000200000001e185a6ca96de111ec7b25cd50ef28faf8b352ac486f74b50936689ce5ad893390000000eb9f6adf30db4009225eec287575e9628410247a9421821f27067c6ba18d22444fef7cb7843e6419a888034bdcecd8c29d4ec497ed3b3ebc25e5e1f98e4157bd7e06ff70364d5631d79dc4d66ea2f7808b2efe8753188c8ebc36b71cbe9a9b3a090f0e3fb9f5e0023e1549c27e4c23469197c434fdd8f4c1e7aec213906e9b8cd286266d711756277171c6e3e091fdb0400000000768a44c156a67929766dcd181b0f0fe9dac039864132aad507dfee98b23886aeebdfc659871dddb9c799cd72d5c9c466aa3e9d1f8e0b0be09357c725b9caed8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410918590" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F7D6D11-AE7E-11EE-B5B4-DED0D00124D2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000beaa3935afe2932dec3243f536fa6a3e788c134d61507bb1e1b0b194235565ed000000000e8000000002000020000000cab50691c78ed4a689a3e62524635d15a319629742b86a95caad2050c44034a520000000598e535637b133eda38af821637b27052da6b5741d5ae503c7075c147834e1de40000000e287193eaf6e562b8e04c921a07db12542e4705c2e628fc5d154bb88cc007c10b8cceff8da944bf9377d863b5e70e784ec25a94614694569ce4e1b83d5750f7c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d8e0f38a42da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2728 2072 iexplore.exe 20 PID 2072 wrote to memory of 2728 2072 iexplore.exe 20 PID 2072 wrote to memory of 2728 2072 iexplore.exe 20 PID 2072 wrote to memory of 2728 2072 iexplore.exe 20
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4cbcfec2ba039237aa01778192c6c03c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aa205ed8496bdfa79db782ac9645a44
SHA176b4cfefa7b9ed1b69afe988a6a4398c70754f83
SHA256c03e3b06d235441d9362793ada6e53ecd7f7af615a33e3c94ffff2a8da2e9806
SHA5123711445f1bbba166f89c164aba3d507e891281ead4b2a2adcc56777f571db6074294f09760b55c46d1daf9d26e339e57bdf900afc477f84274b8804f148974ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbe6d138173ffb49b9b79ebdd266d6d5
SHA109b552e2158c0023623ee8025d06a830d1cb7616
SHA2561763f20046500dc520a46c380a31117a8ea4f9850d5e988151aced78a0478dae
SHA51278a8493e41ab92cff63693a1ca5e6a460e28864e4d17a9d3c84175b5353e52a15c2cd8e2e50156b75c225a8477ea3cd68b2f7ef923571ee870de4aa68b1252ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ef88ee55978b93933c926cd5935f21f
SHA1fa95703da324f6ddbd5025d724f49b5814bede08
SHA25686fa87a29430355e01990c4053d1d1d511b0576828675f998e15e602877a768d
SHA5127f3afe64cd3977157efa9acfc1ad965a4101f1ece910985e8aa9a34b258e101f6ad694903bb4e6979f69d2baebe553d16d464f1b519b0e3d9b1817fbd011d4af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5527a684c87b63cc6c91625a3c5773907
SHA1be560254dd1dfeafffbbbcf32dbb1f9e4e1297dc
SHA2568e8de601ea516a0166ec7420a6a991bbacdd6fcdbd44450b672bb7ba1aa0c9d8
SHA5123c82e88f1ec6ac3ba6a668658752d5697b67edabbf6543e804701836d378aa1813c1763537151b1efc82b0be8344213004e6427ffa3c1f18dc3bccaf2fdc9d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b86020574ee358ab72fd5992ef070a63
SHA1e9a46f860be01213cd52bbafa1b0df0fb5f69102
SHA256ac77d96b12bdb109f4aa01c08e60cdf29fa4f7265af4f2d88525bf16bd66d75b
SHA512850c9161d3b66df73b8672bd17c302fc09f67bbda8b863741bdd3ebd51f166f5672e01488b2fda3412795c2e00f917a9e202022d99b88383ada4993a1e2f2c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57173c69ba0d973903ae19e192b5147c1
SHA1c50aa84ce3cd768bbbeab84d5e41012a25337e51
SHA256e88c9986c6a04a69d80abb737a2c53076b07a31cbd2d502c77265cbb6eb474c4
SHA51241d85d69551bf78e2442f508373dfc36e2d56614e1ab3b453ec6953d2f6bc8e5fe56a11edf38890e8ec7b1f63386f5fc8a70c811c960db3d00d97bad08e1324e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b6b052a8cf1656fde1d39abf30169c1
SHA17cde1b6c74a388dc07aacdaa3269124b01478a55
SHA256ef94ae4dfcc57a7242264e96037f7ff77e69a8d4087818190942a108a66b1300
SHA5127a91a747213d8e41fa6d492488cfe538270db9676b2f88f0e50a57944a3852c6e45d8a67a1d6a89399eacd0db39d287df6c58f4b7c5f984c504ad214392bdb19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560c864b5fcce43aa55102448f479206e
SHA1da09f5195cd02d3edce721219233591d15bcfde0
SHA2569f3b1afaf5f55642fff7209e84102200d92ff16d9b3425b632ab7c55fa0e4a48
SHA5127bfc86ec010c9e6769371cf25728775fea7005d470ec71c0e6792e3cdff3ed70b053b5076daac8de1d71029fccb26f3ec31d36c9b37bbd94b2f06892e89a0a82
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06