Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
52da5812836b9a7442537f4f06084020.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
52da5812836b9a7442537f4f06084020.html
Resource
win10v2004-20231222-en
General
-
Target
52da5812836b9a7442537f4f06084020.html
-
Size
4KB
-
MD5
52da5812836b9a7442537f4f06084020
-
SHA1
1c3484cbcbf156025a9ac3401030860f124ad554
-
SHA256
cad898407073e586e657fe5542fe0d13255462737d912ad2b6a442e7091d16c4
-
SHA512
98932ed309cfed88e83690066bcc0319595030c411cca97472ccf7efbc97ce506c7d73504df46f84886b8e9050ccf4159331857d1b16b0119a6d2f99226a8c00
-
SSDEEP
96:SdyjJtZdyeKncJTTJnJutbVRAnbgphZ7iHSA4Aia4q6ScSAkXfwBdeLnAZE2:Sc1tnyhn4TFJuegphZ7iHSYvUdcz2
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a0000000002000000000010660000000100002000000056d6ed172b24475af0c549d19916c45b145637866ff24363f5048dcb6ada77b4000000000e800000000200002000000063ac6d6294d1234855789125ffd6afb51e9e4e6b0bfcd6d4e4bc02b40cbc06d59000000023520acba9ab485bd589f2e3ee9b4595808d3d43db3d8bd488c26bc9e7653e9efb01be42ed982e98ecb50dddc912d58d8c2cee27e6444682e75ccf39bd1715934b03724010385b46d9a86c0b274e758497fcef51f1e83325ef16f2b9e27a1b5a3e196b04e49344b8cf75021cda1ab59dd121af5a9f1605359acc7a8bd041085ab0c17e1b3dcb95b5e62dd713e92fb233400000004c6266ab4a97a681abd4e3b9fca2262f3f5c97148c786913ddbe2f9170ef387cec26b66f10939a3c8a2930ac726603589b2d976d31617f05cf40d6b3b8c194d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411118450" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{742E0CC1-B04F-11EE-9131-CA8D9A91D956} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a0000000002000000000010660000000100002000000093334cf42d3cf49f013e5aa09bbccaf77b1f8aa1eedd8391bbffd2669d4c6e84000000000e8000000002000020000000d81ada01f429c44cdfd243842d6ddd2776ec40147b0e5c369b3f948d179ee7302000000017f6573e7180c2fb19f30bca7609c06555d88101bba2a7ad020d0d2d4a648c85400000001f09bc265fb39b00094ce1d3d057ed355b3be278ed7bc4c6afd67dd9d229895023def24d331a7ec9f76a273ea612680b2d4115fc4467f5dcc18cc94d9755f864 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e8924b5c44da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2716 1656 iexplore.exe 28 PID 1656 wrote to memory of 2716 1656 iexplore.exe 28 PID 1656 wrote to memory of 2716 1656 iexplore.exe 28 PID 1656 wrote to memory of 2716 1656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52da5812836b9a7442537f4f06084020.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ae4b81fffbc1a3fb6c7b406c7497e59
SHA12b05e2d9e591f280ba19a7a619801fa35abadbac
SHA2568c30a55a18d7585c0acf002be5b7334eed8284d096c6b691433f6e89295511fa
SHA512809cf0f887d6085c3a07993792419b0e92382e55c09ddc2cb76161574267a2355663c43a9315a65dbab6639d6b95e3438a5a3c179994dfedfd16d959cce3f215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5040fae0c95cfc8144ec734ad005c7ccb
SHA1b89afd850a6db64de602e34473fae8abc28dca72
SHA256c19c61134c26271c9cc04e16ecbbd0f0fcf1b3dae9abf04d6410b606c255f6b4
SHA51279dfb0e77cd76b2f70a42f9b7c155b6f68769f38602efd55dad694830c5befa6d1f469f108c8fd58c0ffc9f6ccf0fad11f58f63266c534a87153fddbb7d115de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5402bf997253b46fd5dd908b51369d321
SHA1d635cf4898f10d0fc7ab51fe652ee9b50e6ebd78
SHA2565fb91aa6ff6ad1b0273eac7d0bfcbaff9e913d543c51e3310aa67c4686877450
SHA512f95e180d70eff5f82bc6f1bca6f0da2ab6cd9a11eb5942651e74db76eb71b6382c2f59b3c7ff6760b0e47304ed92432cd4194edcc34aadb22aac2a24dc220e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f7f00e1c188bbabaa6eff7550ca06c2
SHA19cdb8e66c7bb5d11b78b1ec2bf820e46d4c97259
SHA2566910f5ea90fc78cda5475dcc4279e6cf1315605e8a70a79055ac2753483dfb08
SHA51249d7cf6f61ce913020eba792f85460d2b8aa71785d225ed1120c04b579b26eeaea30bf3e585cc0e70039b61eaa0413bdd1c69d372833c9f5a9710162c11b078a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e12f4eb512bd76652894f977f97386b8
SHA11b22cd4fd975dae648f79c42b46dedba58e26151
SHA25656aeda3d71c48dfd96c8a7bd36fc9abbebc7ec536f09a8bacc446f69d7b953d1
SHA512ba6fe5ab3bc9d5d29d8c1fc0c8c8112efba4dee3c0073b91842634727c6723e1d51ef8352b99923da43cd1ca9784a5ce374d8c3998bbb3d3ecb0a6502a349107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6125b642a258c80ad20fbe811e54248
SHA1af9681b82f5130320acb7f6d992ef7dde307bdc8
SHA2560b00e563c92ac56b8020c67f6d8549fba399005739382e4b1bc435b4f46a4c5b
SHA512813246a376634ea09f65cfb6fd68c920a85408254c57b1b49320c9a07f51215dbd2b09d185627ea072b6b28019b2e01cd07013968c1a13a614400c174c86bc9a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06