Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
5a7d5eabaf3b535f75f6c7695a94247b.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a7d5eabaf3b535f75f6c7695a94247b.html
Resource
win10v2004-20231215-en
General
-
Target
5a7d5eabaf3b535f75f6c7695a94247b.html
-
Size
10KB
-
MD5
5a7d5eabaf3b535f75f6c7695a94247b
-
SHA1
692e0619f8af6dbc6bb869755f532a729af04253
-
SHA256
c3efc8108ff9b8b67a03584c346131d80ce9c1960d3dad2d5d4e4fe4e9ff1ad7
-
SHA512
0901befbb9c854be3c38629431f44f6556660e0c76dc49c152b507fe599934fb8152c1a0aeb7f7d8bd715a174f2e8ea15e9317cbc3a6f12a30e2c3112c4b151e
-
SSDEEP
96:xjOrZ0Xtfg0lIPOf9nK9c593aZYr+ItHPVGTtamkWoyM2BuUlv0/5vv0/5vv0/51:wrqTIecYEYkuE0/90/90/z
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411374696" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{133F5391-B2A4-11EE-A623-CE9B5D0C5DE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e322e8b046da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd769173341890000000002000000000010660000000100002000000082d19c7c2bf3902e19b0c16b7c520cf162c8eef045890bb155ea35345c86f318000000000e80000000020000200000009d4df516499d8e6b368fbfc98007652f4e566c49bd3259f50d06683bfea9c6dc20000000f0cec90a993f45ba6ea174456d86e06668b589198fe88027b25ec2b0fa78020140000000bfcf5c569c0ae843f87d86dd70abd72aab1bf5eddc6aaeaf81d4e22d2d88b4be70b6363ae98fcb521d0bea67eead256e1ab2a465adeb15a2ad81f20ea3d104c4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000e001bc086d481ee18e933d872d9ac86a8ef3fd88ab1c79a16266c5fcc208a0b0000000000e80000000020000200000002eeef3c0169933f53f3ec28cf39e253db98fe8a3c173a0aa8a9974a9d346ba5090000000510e8769270b79ed0dc24981e3db11f26a858b73fa3b03f96c28be643cc88f91e08c00e861e697d3ce394fc5f87c8867cad8ce59e6751f0ba5a6b4e76febfc927d039fcbca48cb8e8701f4b22e4d4478c743f95ff7dda2c7bd2090a60e0d4b95917cf7bd794dd3320765bc8fba5bbedabcd2435c6c17af37d62b5189d6339f84af78444ed68507d156d13371e977085c400000002db31132a745c84a3155f693f1a427a86e46e4825feab8aabb3ae68d421c0832e81969173715b9c423ade0a361d801b83f85ccf4a29fd4e7f4caeeea46321d6a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1516 iexplore.exe 1516 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2060 1516 iexplore.exe 28 PID 1516 wrote to memory of 2060 1516 iexplore.exe 28 PID 1516 wrote to memory of 2060 1516 iexplore.exe 28 PID 1516 wrote to memory of 2060 1516 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5a7d5eabaf3b535f75f6c7695a94247b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d571c6be78bb2107e8799641889297f
SHA1b9327c37e61a8906ae6f8c341cf408e3b32c002f
SHA256f7e716e2794d7cf34b0c0ac63740ce97c4b668ef324460cff6a8019a6f808521
SHA512bf1e844801f54a23d83573b0bc69536f14ba751df5e545594314da9455d2e5600f7cfb472ca9204c02fa32c5215a710fc2d73e13f8af34d56ff50c5d8e1dd101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506f8d5993233c6ba1ecc29225b0afa30
SHA1900891f7bcbd98b55aeb82343e3fa46b41be81e6
SHA256f6bf0bd448aa771955bee80175ee08fad81893e04a8b5bc26303bdd4428fec9a
SHA512c79fd80a3f932830869fd20aec88716b546b7e8ba7c57be9240e794610181a21ee056cd644d798da5b3c54e5fa745b8f78b22a9d80648631a5e1f700f1452039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6fe79ccb0d14ae1cc9ee95d8b787416
SHA18bff0ad6059f7863eddd1f4fd6e1624df1598eeb
SHA256957aa891c0c14f516f416dc9c48edf7d9cd9b9f6ee9ff0d69760eb687d951bb0
SHA5124253c80cbfbc0f8ec1b4140c0901b7c59d51796d7bf6d4a6b7bafb30742d082e116d1c0e701e434addbaf59d8669a8cc366ea9f1cb9f8d1d4c61e15c93e42e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5353addbe2d09edf090cab55b5129a344
SHA1a4c5b345a18a0964f98dda08e854a60ef44090e3
SHA25695e2011776021b5ebccd1c6c2c4188fdf798f1a6728ac37ec85ec91258c31f3d
SHA51277ab940ecd0e60a76d6d54c6a8cd82c6a39a9c5130b8fb02bd2c5db3ca3faec3250b598c4e27619fbb2dbbaba84249d5c55c626ae8508f534f6dbbbb764b4b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50357a1f4ca97c0b0cd154e9d8e9b3bec
SHA10dba8c10e67dc4595666f12b0a880fe28f1f7f1f
SHA2567adc6fea50261a52215511b469032dd33baafc6b9fbf55745fae3446127f4c12
SHA5126cf8165545067a157d29bba60365ffb31dc401b3009c290f219b242f3dfcd58daf2c56176a28895c53627a4f09d70a66495185abc100900507dd06feac71bff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8d0023283b9ae0fcb98068a4b3b0818
SHA1f9822509996962e9bf781c22e5746150131803bf
SHA256c863150ab5a6f71f32312bf930c9fc7adde47095c57801635c6b639f1be2d6be
SHA5120104deb963e2c3cacee793bb8ce64b55ab62813bff76b9c946438f7229289f11f53c96f03b45480dc1d6b8647cee3579067746ec43078935b0123cd9518813c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50515bd1eb10577e5829a57a173739a1e
SHA17e6f4f9057f94f6452e6836d3b2621f2363f897a
SHA256758051e623fbfd278100f55dc0dd922e4b7490518503cb08e2952e50c0367493
SHA51261adbc78f09045cb8560bf8eb02d1af406900f29234ef081a4252357877c3623177391df3e79cefcda10a4757c1cf70c7b8495b8b18fc89356ca25e94c9c2b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c23f7798a651975a877422657c4d917b
SHA131def7816869e71764987c9e9e744796d81fd286
SHA25662daf058fc75323faa56476cc1c57ecc4ed6d6abc0844d530d23537bef2deb9b
SHA512e577118856d9d1f90438a9ab3a98133153e77f1789aea18c76d740086c73e1a7deba3bb333a48fbdc85f85acf9c0c15590d6013fade037b67dfc88b5cb8e1baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1e70c6bd1dc5aa0e63925db222cf68d
SHA1e4474f3dcc0fa51cc6c5f197869fd50a01e11f31
SHA2560b89da447721e540adb8f68a01d0aa71afbf13cf7b537b29ab8c626a1e26107e
SHA512a4b9ddd546d28c36ae4aa7d2d052e866c6a480f7a59fb959aef91e37b8b115ead040d5a2ce3c87e9bb4188de61790a19c3d19fdbf6b7d46e45a1404e0dd171ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0a3ea0e130094bd721a5bbdc43ecbbe
SHA1b39d00921f18e1244036b76588a466e81f7104ca
SHA2566f0342ca8b0aa75d233ea70b8134c6ce8c9ce49339555939429e9a99ed1eec84
SHA512f470b4eabff6d01659c7c0d2b48d2d6c295d3f5545f71aab015aee439d81f49badfbb2bf6a6773ee8ef5dbf701b21481f85d9d16ec9018e19ce1f4ac79c28ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abfc75bc0a29e19ab365eb02e424fedb
SHA160f1630899f9996bb2773de27c22348b7700dacd
SHA256eed74c51bce76bec32fd4326c876fc6765ac2a17cfa7c0b6b76ab2020d2134fb
SHA5123e01a6e92649f40a595f72edbac096284978fe0ca8e756c78718376a7942e678a21c1b0607867859920d346a44de4adb1d831cc3390a55d05346e99be2173db1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06