Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 15:18
Static task
static1
Behavioral task
behavioral1
Sample
8f7bedf1224ce8946545eb2eb06da5c3.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f7bedf1224ce8946545eb2eb06da5c3.html
Resource
win10v2004-20231222-en
General
-
Target
8f7bedf1224ce8946545eb2eb06da5c3.html
-
Size
97KB
-
MD5
8f7bedf1224ce8946545eb2eb06da5c3
-
SHA1
f43ea110f809fa98734ea2d9b7ffe53c2485c305
-
SHA256
c524cf92c9d3f91e100a4da3b6579654a1e61b57f23b553e11deb0d141fd49af
-
SHA512
42ed2d4c8a3945aec631c7fd952734aa26e1efe1e4f24d6b3423e3e5dbcbb4ad544c56e5524f89f17a2a6cc3a47322d6deed368b235d134df00916aa63215af0
-
SSDEEP
3072:drNyl1G+dayempGCeNSLwmgHMEyg0khe5CVSN/WUDwb0AxhRN:JCeCwmgHMED
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413221785" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AA7A4F81-C370-11EE-B16C-EE5B2FF970AA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2608 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2608 iexplore.exe 2608 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2608 wrote to memory of 3008 2608 iexplore.exe 28 PID 2608 wrote to memory of 3008 2608 iexplore.exe 28 PID 2608 wrote to memory of 3008 2608 iexplore.exe 28 PID 2608 wrote to memory of 3008 2608 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8f7bedf1224ce8946545eb2eb06da5c3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e56452a1da0c12aeaed3443ee4db9bce
SHA1751004fd70dc2de11a623fc63346c7cb85d34bfb
SHA2565e5dcb68883811674caa553e3d531fcd00316999f78068e095f61ac28662d422
SHA512b22e8ee17626b4baf28abb5431378d9eb8b90450b101b5e3ba66215cd9985ae95b4e6d536433c7f418cbe93b261eae27375c21824bd5c845f00cf2d939df694b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1d616272f72521954c47b8212355b77
SHA14e133e6c19c8610ff99c38f7298f80d528971fab
SHA256f99b8a18e8f88bb960673e887127efdc503192a5207438e071008be31092e8ee
SHA512e70e9c21b5a98718b0cb1b3fa8ef5054fba8ed121e5ee74df1bc0d6a9e98ba37bd2148959e60f4d3e3c3cb6fede9040a261291418597945ff371bec5b5f73ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ed73c5a621d0c5172438b9f40be26f6
SHA1079278cd5a05a2f6d141f453d48829bc2a81db72
SHA256bf6080fc780488ea9c320d93f730135b2551c879fdd67a9280c80470652b59e7
SHA512a15b4caf3da92e07400e414f669dee5085872529d997286923475b506d086426f7fff10cb9be52c7104932ef448b3d21421d9965da2dc7f7b0eb3f630a359906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592efd58cce82af36ee5a344c4eceee9c
SHA13db93c77d28af8648ad4d960ff4477da2d3d01f8
SHA2566daf470d17b7fa70762fe5fdb37111fbf9c1085bd697ca588f6f2a0363c84589
SHA512e3070fd33867dea6a816ca7e25d5883c90e65aa6d3eea068f9bd0a42cc45ddd55f5a5ae4df24b494578fff85fbfa3182f5306c33dc32704775ebbb9bd6c5c5de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1696d78538b6e603eaa4cc68cd4a5bc
SHA12f8e38213897d423c8567a259a2ffd52b660cd44
SHA25633330a5b4f089dd304eaab061b61e887f0ee85d27f0ffc7bc697e8c1969bf868
SHA5129e111c9ebbcfa8fdf0a22f88c53f1a5840fc77dce65b85814f44645fcaf54f43605f3f9c72600a9df7cd3d5205635a5bd3c3c0f2c95eb8f0a8379a41d1d139e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57689eb35f05783ee7e72d095e45d74ce
SHA18a2997987fcfde188e70398becaf6e1c339b9241
SHA256f3bd7fea63290c497df0a0462b9aa65456f498e42b091cac7221eb777c974940
SHA512407fb6357506df4621864b0e62b3649aed3d4b3cb2db4793added1d310a4b0602bc5bd30b920aa31022aca3933465903bfa32c394cd337ef6255bad0a4f3c892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dd5d275815f619082c890a62e021b75
SHA17300ebc0534d5a65b7865da3063e9009752b8c5c
SHA256651bfebb1f8415b9890689c970ac9998d5c0f667c7e0658bec90929f03c40234
SHA5122b679cbec44c10519808c762bf753e0b0592b798b929323e37af0e797ff6cf9fefc373ab6946ef43fb47c5ee237fd1b2c055a04426ddc1df036f6077f662e775
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06