Analysis
-
max time kernel
132s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
51b9e6dddfae087478831183ef548ef6.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51b9e6dddfae087478831183ef548ef6.html
Resource
win10v2004-20231222-en
General
-
Target
51b9e6dddfae087478831183ef548ef6.html
-
Size
25KB
-
MD5
51b9e6dddfae087478831183ef548ef6
-
SHA1
fa40c9a95aaef943aaf09671e250d5ba449110a6
-
SHA256
9450227076f580f9e731df9f0a2ba4954fb2eee02731c6a3a2d3d197d25bd21b
-
SHA512
75ef2d1d1c3bcdbd40890ed314ac63afdf9c2d37d327c005e489a3bca2af4dd6c8be1388ef9de5a3ad2ca0dcd53b7c1ba7077738d32ea4e61b83dd19e36374d6
-
SSDEEP
384:aEmdg2H8oUHGwLIiLOUtxKTeBfKTpk34w9tlohLgWQQ/U4yhoy7jfIWrYc51IlSs:4g2HlUnBltITe0So8ohNG9p6
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e975541044da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411085829" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FB1EEF1-B003-11EE-98E5-CE253106968E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e9178664000000000200000000001066000000010000200000003e79d462f36fb1820370ff36c49324093464861ef9e28dbb6793763b3ea385c8000000000e8000000002000020000000b5b5213ea06536f6439cb91bae7ec8b8ae48d0097e02bc178870d7569cd0407a20000000033efe52d6854462b1a4c88a5a23217b74136172becb1eef2c0ceba3b873d42e40000000c24f4e6455dbeeb8a9834841485fc0ea372930cdb6761fe4c41219b66cf055fbdc77cdfbac669c3438cc4e4382aeaa3ef1fc81cb1b7b855d87d4d91a2a018958 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2936 iexplore.exe 2936 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2332 2936 iexplore.exe 28 PID 2936 wrote to memory of 2332 2936 iexplore.exe 28 PID 2936 wrote to memory of 2332 2936 iexplore.exe 28 PID 2936 wrote to memory of 2332 2936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\51b9e6dddfae087478831183ef548ef6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5d8893f1efa5c1452cc2c2b23568dab
SHA15bb39fea463f07e54b7208853ce957720dd30b04
SHA2562fe22fa53dca88ceb63835afb96e4b240c40729a847cc72b5328194c68887fcc
SHA5125006ee26e0c4ed2e90c6db8ba000c69ee8628fa3fe22639d1982b0fa4a3569af5d430b11d427785fa9647819e8f9b59ba599b56df3284c907c76f3c26c946021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5625665a34731106761c6b3a9123d43c1
SHA1f938d94558de0233b0d4cf2865b311a634112a39
SHA2567b9c282215c7ff057288bd0be86b559edcd78bac5b5b8ae1e3618e7c51b65dc0
SHA512ec55527d8adbef249878ac0420248849f78558604d26b0056eca805a640520d38dc78982b8b753e2e28cdedbb057367cbd2d56dbc957a448ab530c8a18367a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d25c2cd2be5f8e214546a0beae326d49
SHA1ad31e78d3a4a65d4cdecbf2732e4db6a6836abd7
SHA25663a81b434841a3e81b6c86433cd52054fc4951bf163a575df8df35424e09e2c6
SHA512d6cf88a882309f6733b6c922d719b7157989c2348eaccd28afcdd43f394868053c6c0c61b7477e9802ace5c34692d3d32eff352b0c91fb0295e7de29116582eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f769885ad356f2c91ca237a7c71664f
SHA16b16463dad77b35c5422b2f57b75d956a44b218c
SHA256c89a85e06d911e9321201725d5e0ccf41022cd0a83c396102129ece2ab22bb82
SHA512a34007a5489ccadec9a2b703a536007946a80862dac78798140beda04dc8da57abaf2c1dd650866a29182785eaa1f1ba17d98b7727d6f5f013b8ed0d9a6263a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562765f436c6593d5e21b87c8d524d198
SHA15cabd9aed001eb28eed46ef011f4d958a5c7ebaf
SHA256780f5a2be8f6fb6e2826c71aad75555a399a673086458ff1d3a548a11d7069f8
SHA5121e7f00c37efd42931bb3ad0b67fba2ea71b251de451cc48a9da41d9def43f16bd9998be96cccebfd388f458aeebcbd6abe433b16e48432d53719fd2afd1170d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530317afe2c3fde2f93cd5451198bd0ca
SHA1a906cba5d971e5704f20832570853006d33c35d8
SHA2566e189cc2a62ad6e0cf6ea617c8382dd5e39d218f1c2faf2c98d69e4fe31fb5e7
SHA5126cf84290dc9ec5439c1faac373af6267de92357548240045dccbc2ab7870e82bfe45aaa2064b977b70fd7e787f558cd49ab2b3806bd2222ae6c04555ba6678f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598e84a84483cd946d941e6af85611c44
SHA10747215d61d7b599c8c9b732ecf5307371a35fd4
SHA256a5de5471d68126026d3205f222051f79297fbcd6825350fbf831481ed985a3b0
SHA512ae3da261b5b77ca980bcdca3fc322d1195f83a3c467ab62269b06681ac6fc5702f823433ef50ad362b5aee8f7d7d49c541b1e552b456b4db5010f69b66d7f375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536320a4ffdda5200f31328a358f14454
SHA15964d4766fed01d2f40b3a694873f2ba3b638235
SHA256c862cf553895be6899a7ad8667ff72d23435cd27045897e3507ab68fbb7c36e8
SHA512c8b480d73b0d3eaa8c36ca981b8c8dd3d77b1dbae494ab4eb8305a61e187c1dcf86be8a5066155ee7f063027d1f523fd1bd7eae99885f5779ad25ee89c3b1828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9b37ad78df0b28c4d933ca68fe69704
SHA1635d19f369595bc2136dde4a7ce5a40a6cd41e2b
SHA256b937b931e0aa2ab0fc4a2da6c00cd7476c8b3a0790c8cb0cf0ca4e19a2965272
SHA512f6ffbdf51859fa97457c2daa295b22052c9165926acb067d3f68cd5644a6fb91f75a4e1b81b770b07e9333a566fcae50e86ce2baf700faf16894e646c3952a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54abd832101aa395a50dcd6e43a31dff9
SHA1dfa626bbad54ca4cff7847a80577238cd1cb1d4f
SHA2561c18c1714ba25b52ee0febe4f43872a875c0bf1ecf431dfd78b1c1874e0803b5
SHA512f1da3a1f9f79880d6964f9f57c1408865e1ad96109c7a5ceb4cb4e44fdac9bda41b0c3efee6deed97a93bf64e51af1cf9d9fb6609bb67c81261d7f7898c7e91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e8ec00321ce937d81b6bee68fc4fd9f
SHA14a7fe0d88e97420550545d9dd0ae45ee050c8a56
SHA2561bd0f7616e5609700d18866c0bde2045c36e0b9e6b8f20376e3233918325e82e
SHA5129cc12272405159f74a3dbd8f68de12e265f710892d097414f008a035355057e6eea355e4c400506dbce874930db1249f493cc34133e0a2d6fc9915078390dfe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdc540ed84d0d328bfa2eca81688d4de
SHA156514a920bd0eece9c812cf93c9ff02f7ec2a087
SHA2565ddd31d1fd9ea0b256e3ca80467a37412a3992eccba1ceb51f4da70d2cd14ebf
SHA5122049879651fa365c917b0b0777ffc02c601d71b5b3c9e0d4ee28720ae61ed4c45620371f55e2cae3dcde7ede583a0486ac4b62e13e71e65dd637ceffab0a7c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50624228eaf566b663a5603e8f3b528ea
SHA1aac07d74a082a2db9f0ccd8f0889fc6fda4f62ad
SHA2569ecae831404f5c7f6a9395d49b69eca689f7e8d82793b6fdc598d94b9b047aad
SHA51263f1486d14009f77f26de9ca2c643109022af1049f0fcdee5f5d140473e9c82d337befec73b9e800a352adcda7e3a0661478af4c3b7414f5c24995ff2bd9b085
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06