Analysis
-
max time kernel
143s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 23:30
Static task
static1
Behavioral task
behavioral1
Sample
54e18321902d319609ebddf57a55465d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54e18321902d319609ebddf57a55465d.html
Resource
win10v2004-20231215-en
General
-
Target
54e18321902d319609ebddf57a55465d.html
-
Size
16KB
-
MD5
54e18321902d319609ebddf57a55465d
-
SHA1
6f6b85a462412e019f7f55ed0457080e0ae88beb
-
SHA256
1f5e4b0c9e861d599d604cf906ad3647917e62fa30cd53cdbe1e567b786179d4
-
SHA512
d776c6a27cd0cf4de83d121f071dbf6d9da95b051f17a7466314048c1bd1ac1c2a1f9479252b5f85fcf8d01ce1f855b0e823ee57dd1030d5141d287bfb6463bd
-
SSDEEP
384:4okUB4UCD3z89cQVtOrU9gdX5ZwerqiuuZ+uSuSuauosZioZgvYHT/+Fz:4JdvetPP/G2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411177688" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6036E451-B0D9-11EE-B311-F6BE0C79E4FA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d073f938e644da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c193000000000020000000000106600000001000020000000a191f2acb03f728f41fb7025e43d01b2b68693daff2a46d5822315a66e2dfa74000000000e80000000020000200000008cec3333905e25b8a984146147258581e85ad0ec433f4486d58b22dc20c116b1900000006e019d23ebefb8cc6b6bfe1ea3933c332905f7eeb035a4cdd21985e290b51c0e14593205c5e0a1eeee64cf62d5b40d1cf473782d84f7537348d475d366c23f31cfc2aadff7134745c58b124d0fb861cfc2b2785d5ef3b8f5c92ef498b4ff93425ed314ceb6dce9acc4b7d3a30432d43eec656c8332237053e32f4ddba76d74392345b24b1c9d9741d03d45f915eb9e4a4000000025e2da87c0ab8fa4f4c62f04f43aab94021397d532d88f2e7920a6d26a26a4c880bc700ef07ce02253475629e6520fa1534c0996109e8818f34f465194cb2e17 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c193000000000020000000000106600000001000020000000b65b81671ea8c182e47ae13b92ed43a4fcc0bbb5a8b035a4e8b125a8743c8fa4000000000e8000000002000020000000e162130fc5f90673c481228c08e6a9fbb829a931527476c1814d42fc56d8f0e22000000028c1fc4dd3f91687ee6c472165aef96d7efbaf23cd451e591772d7d9b095892040000000c5b175d20dd7d2b368cb5b4484dbe2e8114c6d11b0e016f0ea36692721c9271d7c92f403f302e202f58eaca6c3a49e934bfa57737e59b11441b9e89f8a55a07f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3008 2276 iexplore.exe 28 PID 2276 wrote to memory of 3008 2276 iexplore.exe 28 PID 2276 wrote to memory of 3008 2276 iexplore.exe 28 PID 2276 wrote to memory of 3008 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\54e18321902d319609ebddf57a55465d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b8c8e4bab89215b7e12438a9b201485
SHA1b25a015d04f5fde3ef00b60d0644791f97b18816
SHA256aafa35e3c917c5ca5351c263e4e3059f0796534e69b561d496ff36ccb9b85177
SHA51239dedb817ae3b369348fb8805ccc059250f1dda556d56f5000f4fefb0e8068d427b9a4664e892694bc099062ca31f347941fac74b50f77aac732ca495f41de81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cad26e17f382b7e68965175e9e8f2dc2
SHA1c321c2949e10c938d7d3e0f80e06d268aa7895c9
SHA256c54ba64031f9432dacc230fbbe7b8650a476aa006f95c718dbbb3330a346285b
SHA5127c9c3d3775c7bf3779c3f20f56e212d1c476e0d5da942d9ee3da6714201998440017e4d8baa0a037554fe2bd59b2efd3bea9d01aaac832a2c5e7d220717e4f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543e51ff006e5959fa6b28cb83b03681d
SHA110e949133c8aae9519727fd710ffcc85764cf928
SHA256f0cc179e302ae0512804b55ad8588a1e44b4bed396f2884cf90b64b8a05b9b35
SHA512a66118abe9a36c9be697f4b7f99dbeb3ed74f57fa4b23781141620e27d1034d7a1fedccbaded9a28ade74278cfe9f121c9e17dd73ded2075ccefa2747b67638a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564631cac01cefb81dbce75e77daf77f9
SHA1213734038d8831d65a7b271ecdd6ee84b2c7d9d2
SHA2565ee9dba3762a036c0f8d20259ec17f350e967c2c903a5d9dcf05bb30a4f9b836
SHA512eb812d7513450c7dc72c5f2ff696bb9abaa58f2037caa47182493e3c503fcfc3f6ecf2c0b711663d0695c8b133bbe055296e14dd2ed3093748f6701cf5dd965d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5d8644c15dea7768f7cf00ce8165b83
SHA15f48b9142993c82c8aa55f9e1e1afa550be42d6c
SHA256691827241c33fca2c590c76270bdf16e99d9364b67d9fff51890fa06bc0a7555
SHA5120b147d7f91bd1433c71711f93a6dbf265811fac6731bf26b8208aea9537d3156f88266c2337b8a460fdcec3dee973988fd71eccf54e82736349c198f68f43f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508b854458c812089778ed0b6fcdb64b6
SHA1d2db4a9776de0973906988aca932418e792396d0
SHA2562aad1962f19a44a1db96b4a18af67700dd225232dc25363414a4e44635204578
SHA512bf181bbc0ea0f1dcf5bc6583ff10f9d5fb9c2868d597d3843e4d3144458632aa1f980d5bad0c0916ba5e98287e2f4b6ad5a6d35a4480995db65c7b52dff75ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533093efcbc3ec5c0e4db65e77c0a54ed
SHA10224e7203dc8d86bd411f9f8595128db13aaca81
SHA256ae80ec5e40b520f3aa62308264e32618c9bf43d842025b65b8df57b6324c55e5
SHA51241f870cc2a283b26baea2ff75d919c271ae87ee5a0cddf4db8e9ada20e81018b87987cf38dd35c9a399bf5bae0d95147d6a994867928b342dae244cacf36a552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffda7ec1c3f7a9cdf04409ce649a9295
SHA125d4f0a7148996291ff3e5c622614280f98a2340
SHA25660fca581495c09c87c8b23d51916c379eb99bebe556ad34bcff9535cd2d55ed4
SHA51259a40f6a59b5216166d07ba581a114487cf29e920af70ee59c1695440a76e8f264f014800234880bec19f719e69cbfc28dc6bf28ca6045a776c904e19bef353c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506db7e087124d031b36953fe77ca0907
SHA1a2debb830079a3acf35b5aa954e91b1b3cf92179
SHA256a4eff53c64c44dad4672e3b6a951c10d0c1b702f80373e78fb2d8e7c2cbe1441
SHA5123f14972ad5d30ae870fa2c906c5aa14dd07c47bfb49608ad53c1bfaccda27733cc0a5f6693869c62a29fdb1e5eb33862e727f265c51d84c41b18ee2afea1f7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527e4520572155e3d18a42dd9fa6e2c15
SHA129075f20ef7c5edac6120ec61423c8368b090def
SHA256bc55abf5c3916959e3ac294ed3a83e86961a3aae3da07f54c73505826a4308df
SHA512e3a6b5019849f9c54d5d42f2363cf60f422527e63b9385397d9a7236c46a71b8992e59540dd6b33daa99ab87e06adca48a19f29aad5b882bb946954684a67524
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06