Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
4c20ec9f9a84d98435e3e36431484988.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c20ec9f9a84d98435e3e36431484988.html
Resource
win10v2004-20231215-en
General
-
Target
4c20ec9f9a84d98435e3e36431484988.html
-
Size
43KB
-
MD5
4c20ec9f9a84d98435e3e36431484988
-
SHA1
ca4b4af804bc4b0d8bf93c93831a7c678d8f8102
-
SHA256
a27fc336664465999f7b32af2b676fd9dffe7fbd245af744232ca6cf5f8ebab4
-
SHA512
0e528cf7dfa4f98feb5cb0b98ac386e8c2a2abc8166b7d29f7b3bc3ff039b3d3afc557587d6249a03e2c6a07f2edef48980b2ad95366dd2981d590dd2ba582b2
-
SSDEEP
768:NDY0ghFXEh8vt88czUjLyuAX84Rf15WigwE9O/JS:NsDXEh8vI43F4Rf15WigwE9O/c
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14214CB1-AE52-11EE-B3A3-EEC5CD00071E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20833c255f42da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410899694" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000010a7a8b91f3577da4c4cfc9113f8a52f2e142637a1be0175a3273cf42f135033000000000e8000000002000020000000fce16f881fb14e7dc4b1593f79e5b8e6542c305b99741879bbe8022293bfcf1f200000001884c70ac41d1363a552f80f2aaeabbce1a84d0d8d8ac74526ca415cf5b3e41d4000000048c15ff83f98cb4ccb95337ca85697e676760602a2603de437028587480d8b047b1545022bcbff09316a760e1baa55d288eecd1856c0fe4ca842ff8fecfbe17a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2668 2656 iexplore.exe 28 PID 2656 wrote to memory of 2668 2656 iexplore.exe 28 PID 2656 wrote to memory of 2668 2656 iexplore.exe 28 PID 2656 wrote to memory of 2668 2656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c20ec9f9a84d98435e3e36431484988.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b38781d66df3621e0996ca9302e44c8
SHA10b2d09c9ac955a59a93610d1893d52280c137785
SHA256ba072b257ee4a8824489089a03b83cfae40997c58a6ad36cbe30490002363ef1
SHA5127e70fed98f8e8c3b80c77014b49e283faef5ebd6e95a0d60ad8988b47a1f2d280e3ee9e957c57aba185f755fc86d929a85eb8c39d462e8d177319bd7a9f43443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5498a778fe1ebbe9ad3ffa70e06862317
SHA1cfb3359ef8b83836c6fa9030dd5449585ac6dd31
SHA2561d4d61f8243fe2a5a413f76fe5fbd8e52e9fe9cde9c90280cd838b5914f36660
SHA512fec2b184e97fa9849e5240a649dc0b065aeee801ddfdc52acf786bc92397af8563a913f3ff086a90331ee6b9029279ac754087081a42f87ce45fda7a3d2d359c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566fac27192ecdf725c20e7bd2473f53b
SHA10e1176000648c915c23bc4668c007c4034482b48
SHA256da90edb39fc1fe08737db05e85b62a9cf97548b17e33aa1b0c334666a5d4ad73
SHA512764b89dcaf15110daf949510f93c1604d597903a7fa2c311b7cf34456f7302fa16afc1fdcde50c626bbf08cb202a0271d4464291238007420eb2bbd0fe1656e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fedaa37e6d821783b70afea4a23aab29
SHA110b63cb9952cf2a7fe5aefd12d7ac9da8bc80ea3
SHA25600c3c4ead93f8ddc39d6f18b503854b2030516f57a024fc8114c5862e2f14c81
SHA512dd5153d9366d2853a1a30ec405894ee192a59e692cdaedbd2fc49acb94f43ed8375c3f715ff1ede85c61a3a0efc51720a466d1d7805bde5807a6a3e27e396d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579c2ec3f5e61530c9b3afdb83a092486
SHA1a5c5a009947e117b3695f6cca0692096517832f9
SHA25637b0c9543e6daad6550005ac9294c18d662268e3ab60438007344c08f10b2cc6
SHA512996b26c54b1cf1e600e0c5b543c29abf56bd5480875d89d9964cfdb950d67c492c9cc73a8834d11af617096bb27c2819526b9971a4fbfdade0d82baea0f81e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a7f9c5b240c312c317e876f7b90bae
SHA1978be8aee7e9c79d3839cc4134859ec9c49ea911
SHA256203155d5c8681dc1239870c52df5dc2b8dfba1c3f90a43c9302a43414d2f764a
SHA5125ffad980b6fe71fb1460f6e7475c6b7de4fa5352bebfba43a699cd016dcb7e0d1045f0b7ce9a2830a82361326f99decd5a5b0fd7d87870af5e5cb8b70c7a2ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e401e9106b69621ea2e6f9a419e3dc62
SHA1b127275954f8eeed5cce9cbb53d9f04099d95b5e
SHA2562ff6b95d1d5bf3773af865f36a3c4203c1d24bbed527b858f1e4200191a5b9a4
SHA51260c528618df99d5f04b1df6efd78f0cf4e07d3f4d1bc34109e572c8fb9d5ab678c3a0941c2a0925617b62debe82957646223f7c8ddb20a9a8a6ba7cc260dbeec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f00ccb8917c3da6d99de9a870cdde2b
SHA10ea627571eee9dc2c7551884b80b7942a98371e9
SHA25687f6d215ff2e402e5bbfb4686a0dbb9c34102a70920fea3ce57408ad18cb597b
SHA5125506de1c00440df2623a01cef0d857f34f9b331e498892b64472560b307ce673ac6dc840b4a0c9c15625ec403a4e6156a258aa441d6db80ceea6d8b8429c14eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d41be36ef24c943c8eb709cd8b46119
SHA1d11f4eb88efacf4b5339f929235d88574f5e9436
SHA256fb8d385bad4778e325e8c85467370d48590c017daeee88e757d358700f90c9b5
SHA5120d21ee9ff008e026d819b82b5de9982876eae490d187f903892f5f53ee9c33f55562de118f23774323f1c7f40ae6424c7078aff9de130430a171f651faaf0347
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\478691279-postmessagerelay[1].js
Filesize12KB
MD592169c8a0fbf6e404267d0705cdbdf42
SHA1a5cd88b74ca5ced239cdbfb458fe25540d671f46
SHA256dba668b49a111527aac8f616b9053ea57c944e01a84ebdcd02a13da921223384
SHA5128c5d35ea512fa7be367cd9a9ded2f23822dcce730e5502a355ed0d48949ef763eab13be0d50a66de6b0f8419d6a002c12c4ddbf20d97f5393ba922e48a4f02e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\cb=gapi[2].js
Filesize64KB
MD5ee01651d160cfc55249d6011a3c45916
SHA179d6121df6575974ad21dafce33ec98e3f2f0a7f
SHA256639d75299973c7d3794eb7eb129e3b5a6139f9f521e1f14383abd0fd501219c9
SHA5128a39dfc1ff2c58ac106225976aafdaf7befc0a28903a0c65e2c272e1967c3336af2b477ec12604400bb8e16aecee6567c9cb9d157e3d54649e28b9b2f920432f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\rpc_shindig_random[1].js
Filesize17KB
MD5f019fdda31635d2a31b151ad8ad56c7a
SHA16adcbec55f66ffaef83d9a134423aa98eb2a2189
SHA256c7fc0b1526533002c956ebf8e8c42c3ad3f96c41ace73fb4063cc89051944831
SHA512fc278c12316e098976833882a38c788d812f9d36bd1b9b2b8c87dab4dc906af26a860df95436ea1b7d509236d44d0533d475a153437f8f5d42653fc28a77ad64
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06