Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
54f0ed183c627de19f3d317c7fc0bcb9.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
54f0ed183c627de19f3d317c7fc0bcb9.html
Resource
win10v2004-20231222-en
General
-
Target
54f0ed183c627de19f3d317c7fc0bcb9.html
-
Size
247KB
-
MD5
54f0ed183c627de19f3d317c7fc0bcb9
-
SHA1
ecde1959fbcc317d06ff8ee1055854fecc57bbf9
-
SHA256
8b357a7103ef7205829bd1efef6edded06a1ed6ab4fd320a1f6e4839c57c83dd
-
SHA512
7ee04b62274e9541bca3698dbc88e0e3aa776d90fa786fd7d0de6dde952e1349c1769286000e5b342a0724914935a0b98e6f5e50633b4c563702b0cdac1eff44
-
SSDEEP
3072:StbirhB9CyHxX7Be7iAvtLPbAwuBNKifXTJd:StGz9VxLY7iAVLTBQJld
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0cf2ba1ea44da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411179583" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC0E9201-B0DD-11EE-B55C-66F723737CE2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000d5d5a6d5d3ad30fa0df54c8c1312f783ec23c5226f915a2bd8f16bf51d1d53fc000000000e8000000002000020000000e145da2eb3376bfe71430ea492d4b76f23b494f23d44f54e06bdc14e831b4aef20000000a63827b22cbc88a1907574591feebde4ffa149f6b5af5411f02458047d01eb8d400000003bf0992aae9b2129af9ac31cb81a88fde5d5515ef9f8414189336efc88637fee8bbae9fe5a582fb77e8e4c21e2b6837dcae9ab0c969e01605f4bc09d9d842e4f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2280 1712 iexplore.exe 28 PID 1712 wrote to memory of 2280 1712 iexplore.exe 28 PID 1712 wrote to memory of 2280 1712 iexplore.exe 28 PID 1712 wrote to memory of 2280 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\54f0ed183c627de19f3d317c7fc0bcb9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5848d23914105ad8a46341913741f83be
SHA182e0f3783221a0ce81281b680c3f55b84d8e49b4
SHA2561afa066b182caeba5771db0d807da2d4996d2708da74eacebd58aca531231c1a
SHA5124e25103658abad9c58bf694f5f956132c510e50ebcdd7bb50b02abfa0467a5ac072a3dc221c030c4e804406b802fb6c5c8e8d546c9d144bfb0def362fff798e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59521fe01c8e33697858895a0f2081e4c
SHA1b836bc1445e62e1b71c897cf509b96ebfbeb088c
SHA25673d7097b2021c9d139772b720dec81ce18e1c84d213b1b5cfba4e2fde7478166
SHA5128141048c1d783d082dafdc4d1a9e4f05b481c8bcdbe1eb3eda15f8bfa24eb9be82d54b404e9d77cc129175f1305cf17c68cedd7636a941d8cbfd6e4efe87dde1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56892b459b08524ab4ac09aa92aeab149
SHA1d1818029be89c72ccb97be2e1aaec8a28b93e06c
SHA2564bedae67d3a9e577e872cf4c4e2be7aa41ebe54c1333f30754bf7a150d5cb946
SHA512366097456c04ecc1d4a5575fdb521f12280a7b354752e0d4426d6733e02811c33368b81eba3f9a172b9d808d70695cc545d3b73e40f2caf3d612e760af4af302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dd06b686f54e74bba248a62ece517fa
SHA1fb64fe8f12292a2ebbd1a910aa1c12daa5dda3e5
SHA256e49e43f6a72bfeb7e3b0f5d4ee0f7520211c937449d6f444db3ccd9b9b6ee569
SHA5123ef5d3eff7a44f064bcd3ab95c3b3402aac60440520341091c3300d80c5bbff18af1b5b824d9d12242a4481386233c23cd0987781dc17fde206cb504f5898fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8a4aeba7e725eb3855d705cab119dfa
SHA1d93332278b7b251d8b7207af497f2ab2ddbb195a
SHA256844f5e0e0fe14f8956d7414bd4556d447dc1d58fe0ff35de8427b79953cda294
SHA512133191338c3a4b0607fdd5bef13c14caefa30e0a75d15e860ddcf9cd8cc0048c194c806ef303c0a3e9ca82642d4e7da223f5d8cdd4fa5e780937886a506f451b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d40fc36546530d282a0d7169135697ab
SHA1905c143940efc880fc339e2b77365b6940c503fa
SHA2568c8b5c7469e0e3a028237b1b4605b7fb5591467b805c7e3fd71b5d1b8e403440
SHA51282a9a6ff4878bd705905a22ddedb50a2772f9d74f2493bdee352ac0a2e6be02acdd0e078d6a8bb54f49c47958e42b6f66a6f38b9a04a0eceb71e0052c9fad9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b369ca3a92f262010296b82371450d1
SHA191e15ef208e856c3ed0fc657c5a3d97e472b87f8
SHA25634b9340661c76e08f194dd67e7e86a36b897c3ff81baa5e4a5f7c34e423edef9
SHA5126bde69f4ee06082464a6ef78d3156ea28fff8c2b807178cffe141a712967e3bbd39b0808ef4b9de76cb76ca18e5ad5506aed1b826ac6ce89dddfaf1e702749eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571c939984a630159e38bce1e15084667
SHA16ffc3c5cf31d70ae496c02dc39787d862810bb07
SHA2563422f14bd5bfe8ccf41de977a59541569c65a6248313614e364ffdf1809d4fb1
SHA512fcf34b1122d30926d90f16cb93c2d53c1494ae1207fbff833847c570c6e25415ec93bf31ddbe9ad7fbc845af848bb05b99de718923b94491ae115142ce24cc03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bca2a5972c4056f5e16f93a5d36f20a
SHA1811a523c5bd47a4867abba23cf549da9edbb2d01
SHA256f347edeb9782a6f64e58d05ffb15d517b4b568719adcc19dccbc80db911dfc00
SHA5123d2fafd2f16213737ebd2e06c27984c2149b8a1584858be101440ac7228ea2c946f887df42053ff4d5a8da9ee298ee6d67f297522e3331871ed0e75b8bf7cc42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557015b5dc523980ce40946c889238b4b
SHA17df4aa9c374df79eb7686aa228f6f42a113d8ac4
SHA2565a59fd1b92340e1e0c50c1bb619f78e776296a01ab0b2b63eb2887759d605e8c
SHA512a4c9a2b798d621207e1de8f63fd780c89177c6d4e8bac0b8c526c51d822af8a9f918124eb5e0ee9d7135878f50b8bbbd919517c97d95b4b74cd378af195007e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577f87c1a238723d95e9827667a4956c7
SHA1a745f6e892e49b2e55e62e499ee22ee0b51c75dd
SHA256da88ec250f0447e20ddf496e9b9d05ca4037156782f0b5fff245006f21b0d86a
SHA5121dc09b6e669fa21ffd12ad27adfcf0b35eecf88bdf8cbc54dae93a9cb530f4d94930210c4d420acf429796c1a7f86e00b620016b67837a22dbd8783d6869ac12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5146f269bd8287dc38485a23eacba0fd0
SHA112a219605c30dadab618d02194b791cb2a449259
SHA2568808d125a2e1f08b339409670fa3028f54050b8abbb87d164adde0f689ba0b7c
SHA5124bf0b9eda0db16ef7390ebe57e808361be081dd44fd28a68f3622ff2681fb8d36eda432af5708e7f6cc086dcd608713cb35e76ea4ed9e991200273d8a17941b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a69a7656f141c9d0fe6bab39981539e5
SHA18ffdcf713a71155fbb028aa59d47906e7a064cfe
SHA256a338746b71c99020d9900e660e940eb4067d96ceadb0428198de0fe5389f9b83
SHA51233dd0a7b2e28a35c324acc3fc8f49d07cb7e50d4ab3b95cdefdb4e6aca02feff295100902c508ba5a0e486d6d56f52fdc0266afcb30d2f6a4033385107b5a106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bf1ea89a5a82e4f7c0e75d8a9c204fb
SHA15b9a9b663f0a07680baafd7b6d9a5853fd6c03df
SHA25658d594398be5388766466d4e15a6785528bd6c2d91ca3fc720d47459c0897de4
SHA512fb74fa78730774b9d9b3dbe3e6f0654eb40ee0c0c8f81bf890f073f0f687d11d62ce8bf7fb804738ff003268ffa7356eca318b02253f3773938d912f7f7f511d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501ba7704122be2009d95d16dd2ae6789
SHA199279cdd51ff0322c789a28da9e7c4318da86f1f
SHA256bc5a8556500fd8449b5dc83a9d986a19ee446dde9ca84124a77b2427ff85cc96
SHA512b892b962641c6abeadbd05f5788d178e5413d1b13d20f90667ce334cff902fc23db7d0b59f221c7e0bb9acbf194bdbda30e0f3311d3a87e0b1f6cc81f156ac6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55ea9417723596dd95f8a33b9d6a97317
SHA193196f9fb90d875f08674c93fe9eeb1e6981c91a
SHA2564d98c296caae7c249f0931c2e7fdf91a82c56652a171d270557f6799f6a8b80b
SHA51297f60af92f495f82eff7691be17eb2fa3add4b1f974ef61665bbaab154fb165463953aca9bb737db4111e826bfb4fe4824317d1cbd61489c014849ac81b6553c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06