Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 05:48
Static task
static1
Behavioral task
behavioral1
Sample
52b333eb66a2769b6a5bac8b7131d79f.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
52b333eb66a2769b6a5bac8b7131d79f.html
Resource
win10v2004-20231215-en
General
-
Target
52b333eb66a2769b6a5bac8b7131d79f.html
-
Size
53KB
-
MD5
52b333eb66a2769b6a5bac8b7131d79f
-
SHA1
b4d1717fbc027af9d8c606f5c61167ec6af21549
-
SHA256
e30b7874a8a19fbdaa5641a8a97310ef61995ba7d1556d31374d58a876a33b31
-
SHA512
46ef288f595891c2a346a4fe27f19ef6fef3e8b734f0586a6300688bb059b0a0258a407cbf5db5595d22fca148927e655917520d512f81a32a1d56adf1ff6aad
-
SSDEEP
1536:CkgUiIakTqGivi+PyUArunlYK63Nj+q5VyvR0w2AzTICbbZor/t9M/dNwIUEDmDn:CkgUiIakTqGivi+PyUArunlYK63Nj+qn
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0bed7b15b44da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000e8ba73bdafd181c6ab111a589964208ee5a85d06a746a3aab9d4416df590b8da000000000e8000000002000020000000c96287c08122cbfa9f6175e278df222de3f0e702125ac69a5ff9504ffe2b827a20000000c20f2f0a41299684caecd2805a4125b9a0effee6f0c5c2566dd06c24cff9545540000000690f1d2aba655e41674a6494300ab36e25ee9ac6711401c58dd2dffffa616d616c66a5ca458af71079b5e05d2bba1a26f4ec1694780557aa9ac50dd585087721 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411118172" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8E9A0E1-B04E-11EE-9201-42DF7B237CB2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2312 2088 iexplore.exe 28 PID 2088 wrote to memory of 2312 2088 iexplore.exe 28 PID 2088 wrote to memory of 2312 2088 iexplore.exe 28 PID 2088 wrote to memory of 2312 2088 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52b333eb66a2769b6a5bac8b7131d79f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5921afe88bafa5d65d30b9ec64b1af62f
SHA1826b4cf78456d8132c7672a54f4fd1fbf68087c5
SHA256834ab500d77f3482c6601aa01b5dad948242d16034ac00bbc104fea7dca325b5
SHA512232a6d8626d0b402114fc80868e65eee8945022cff2f48977a2fdfd48835bc953d47dbce3fdb2b23c8f63ba8c4d96df0a19f1c50216d7982a97b78fd0242edf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee387be42745f7a103477d76dfc9b08d
SHA1937417351636d907feccaaf7902f28e4d8325c6c
SHA256f92066f3f10bb3415dfa78092c46dbe75d0a313d2f1f183da5a7d16681fcac32
SHA51267afc4036d4513bcbba883153f6f919d6d4837b3a3faab8f9b8e2b359720859b4097bd2764c8786e948e2e4f6c257c6e788e0cee2f89f06e35540ffa04b45e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b93e1a71d2e5924f719232f63bd4fe99
SHA1b726927e7b521a86e92731d810d769212601d8bf
SHA2567ebb96977b336b9f05f764922c1c0e459ab1b695f24ba22c7c4b5da0209eb898
SHA5124cc0dd62abcfdd4b83cd9c30888b3bf8cc843d95dca2f13bf498a4974bf89d2a36505805989793cc7dfd5511a89248f606eb53ccf8e3ea5e97c94e122d5d7efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9a44d9e324f0905be36cae1eaf1c44e
SHA195f661f30c4661fee33137c43976c31dd3e374f7
SHA256892456a3eee794b97d499cfa8cf8fdbd4fe18d6941f8f4547bf34d475ca24344
SHA512b8baafd62c01b8eacd02afab84a345d29d933c4a5b642cb43f1a9fceb227d983a20b93f83783ce874c1b2f823f4bab90e7b79b3166e76377be832c7246a561ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57183a26719630673bb6ae260a838f680
SHA1f2b6a4fed9d844c799ecb58196d2de96ffc426d4
SHA256ab5a5126573724b663e61693032a55d90d933ac4b7b5b02e4d1c203e68c41a2b
SHA512c1410b848141f8db14d3ead1b7adf60900f8bc5d1bb4ba3df9cebcb605c6844d6e976f6463255a8b8eeab86e07cb1260da546088d20edf3bc2425ff457b65c8b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06