Analysis
-
max time kernel
51s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
h.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
h.html
Resource
win10v2004-20231222-en
General
-
Target
h.html
-
Size
83KB
-
MD5
2852f1e101d1da20b01f7a64e6d72f11
-
SHA1
a35a1bd5974b2db3693a9a5bb41d291bfd62491b
-
SHA256
87cbef589bd6dd8614ec7be7ce65ddc624c891b27b760e771e0e793ede14c694
-
SHA512
0bd06aad6c6afa200b83cb1275fe911d104f688001d159e873d4e7996d4c3b7eaf79f6e642511a198d762112e24bd84cb4dac9f881f66b22153653547a359bee
-
SSDEEP
1536:MHDdhlZqp+rgL9RdNZnq85reg019BiojEbGyKSKNCfw4KmAdAg7ZAUYtNRAyk:MNnKgzYPk
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000005b397ae8ce115d9be8886d9b5847359c3b2ce68d63e224efeeb8aec313518a18000000000e80000000020000200000008895e3514a6574a2a9003603a97c3f9230d0e04a0a0bf43b761403e210cc58c820000000fa0a4add63b97021b8c193e336efdc74d6a016141bba522b988edd2bf0d5c3c9400000009808db6123e431c0d4d1ce58d44b621a61a9324bcb7d7d1b62410cef816fdda2063ab2f58f987b398627c21fb37c51cf0079ae20d87ae547fb3d656d1fc1cc3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa0000000002000000000010660000000100002000000048e1c79f3ce2ae56600755bb6e86eb838f9365d2dfd03983c82f59486ad129a5000000000e8000000002000020000000953a4e22b99018ae900693f714b6ea95aac26b812aaee22f12ed6e9ce35f652b90000000d9287c3891df40edf5e83c49be7d86e554061988124775674c8bb371bd390715b4773f84a595a95c0a69ba4afd936892137bd078da3dfd8c8b21880267fca195cf3a954770638e470451324e50e3d0d6b152111a162f246d68c6c014b6f943ce06f13af5084724794d13a6ad9e9ba46e361129504b7fe92c5474cee3ed38d5b946f94e5050c873aea07e5fe306aa541840000000ff92eeb4aaed146044d3b8d9fe768cedb4850f715857075e419f68b70a02b0b45e60ef7ebb48b62b0a82ab5131dc17ddce823aaa0f449ea1e922894c03e68651 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E91D8EB1-C9EB-11EE-B16C-EE5B2FF970AA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504e7abef85dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1752 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1752 iexplore.exe 1752 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 1752 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2672 1752 iexplore.exe 28 PID 1752 wrote to memory of 2672 1752 iexplore.exe 28 PID 1752 wrote to memory of 2672 1752 iexplore.exe 28 PID 1752 wrote to memory of 2672 1752 iexplore.exe 28 PID 1752 wrote to memory of 2360 1752 iexplore.exe 32 PID 1752 wrote to memory of 2360 1752 iexplore.exe 32 PID 1752 wrote to memory of 2360 1752 iexplore.exe 32 PID 1752 wrote to memory of 2360 1752 iexplore.exe 32
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\h.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:472081 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5896c193a6a6ac0a532083e9799fe4540
SHA1b56d41fe21c1302b49b3f0695ebd251c106db4ff
SHA2562cd9530548d2182eb899a12dc3a358f36cbcf7c401c8aaf0f7ed84169234b37d
SHA512c365e0e9fbce8a877bb21f782405ac87c78d10e6ce38e248e279379fb490d283b533b4c4fa56617b3534dc1cc2be8b97a8001cb6c2b45864b2273efc0780b809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e30a49677e394de3fa709e02331c8195
SHA1df6ab2de06cbcea7a99002a293d790d356c920c9
SHA256755fb107e98787e40dd217239e36daf9c3f298b24f76cb1675e7015eed23e83e
SHA51290c5c146894a5d8846cb0878adcda924c3080a7b5c4d945c040f6da208d18788cb8a5d0af82e26185a39df8afb5d52ba15184a98639a9165cb38db55862df375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7ab6e55a463fca7b63b3653b770c43f
SHA1f6423e30bce24640da1af16017ce0582f3ad9f68
SHA256b24f0cc9d475ff4a1e452583d2edff1f59a8793377cda3e81a4e715bd1ae680d
SHA51244f8736d7bdb89705398238e07cce966d5419ef670f1b14c63d2d5b733399c88c57ffc29eb0f6958999130d935630c11d9d7f284cd6b9703ffef10f0c690a7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593cb6b74b4b76c994e75b76c2c6676c4
SHA154e790c2e6843cb58324112741f6dee37966890c
SHA25619dca7c369ae2897da31806362e6288e5249ad29f50ba241a5feb063161d1f4d
SHA51273de806c7bf1b0153531eb6ce289b6e06360fddd28e172aae33ed475d002dfe1ebe6e1a8ae97aa3b3f3eeb2c2e24c7e5cdea60919b1ff531fa26f4a28e4f21ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d3dcfb12225ac354173b587f2551c6e
SHA159c0837f4ad497b27900f97bbf1c83a654832753
SHA256cf1a11ecf0f0f6516b900859ffc00aed10c07b07140d219d0910c12f34394dea
SHA512c0f49cc729dc189fbb9f6f7d75740a3ada15b72c77840cd0636a20ac83583cab7db0a5ab7084416981f53566583c4acbe20e7275a8d01aa13585f21e86699b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb654c8eb5c48243cb7bd3d3fb8a0475
SHA1c057db2e8fb47f63bb9da95b764a26fa258786d1
SHA256279a02dfe42fd86618e33a5f2b81403a84b1cd6378603181bcf33ca378fea5ed
SHA512095ffa1a5af5adaf6b3d7f882dd7be22b6efd0a96cbab02653fdedfed79d8bbd6582bca214110089a88435c1267789bc8aae66332baf08431e2de814cc895097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0e64c8896bc385ca8a5fe491200bb8b
SHA15172a6ccd4deb0fe2c84fed029b974d236294f68
SHA256af750bbbddc04f8f57f0efcb8f18637d68a2774129d85e9551a43653eeacddf6
SHA512c4dc792b0e91eb404efbd0be7592a17beced76bc1c6e94dcf05809f0ab287af8a90eadd8010adf2913f650acc48a763969b1f3759c430f6974cc8a460ffc0a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51332e4df7e01b30899dd50cadac70106
SHA19ab2ae1e818c29271c0a5401e1fcf06a2edca4bd
SHA2561e0ee0ebc86df2c0b83ea08d7161cc8c80244c13fbd1f293bf46c67ea6b9d97f
SHA5121ee24df2f75c7be7f32b834f8424b2f80bec8e2f3833d300b3cee9631c81b6c6ebb65e37eaf29911eded741d0181529d5f86007f6f499b4f2362aba2b67409d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538c5e94684d1beb7c4411328be903e4d
SHA1a845951ba9c6a9ccb5ccb0d648b47d68b13b4cf8
SHA256a091746b6c4311f6050b1b5a4af8b2328d4dc5d9badb208b466c2ea24248765e
SHA512f862e3233074598f55cf50ec3b2d69dcf0dd64c26d18abdc9df184fd469db1fc0ddaa7c3767bfd3b0bd6181d3c7d95980deb0e2a9fbf14f0b2122ced59cbb6d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5396cfb5ae9e18f6d7afcae810da84136
SHA1d40e53eff2e71a42ce6cec38a2ebdd413a6d82a8
SHA25641c00b37a75c60a2f2990dd2849a6805cfefc063666bbbd118ca8fc1da82fe95
SHA512a81bee090d190c07e7af197ebd948e771c62f9eb945678b971f9fe757c4b62d288037094a1b31820c7fea10b1a26d2e733f825adafb6cdf4949bc15a80a63f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d00e3077e764550a5dbded0419d5810
SHA19d7d2982c318499cb0727b4ad528653ea63e715c
SHA256da026514bd8e92ae8514ddf269e31111844ba8704ecb3d3d12690f45b100491a
SHA51208d04b76baf0fbf64c0e193422d9206c47b04067a98ff98dd839f410c01426c07326837a95bfb3d75c307fa39c278ce83cdc1d5d40e21c47f6d89bd445c87f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcfba047305d5ef020d7075e579933be
SHA1482cb83e0e18abaad3000429f69f71dd1fd2e3ec
SHA25644f2821c4ad175f4944c7b22688ccfa1b2373a5d6668cb7f018368ff5589a330
SHA5125579c9836177d863aec94bc501c72aec09384586272bae157018066cdc946143b3675250390268353fd7baa89c2f45eabee85c0e39eea3847b0ac00173b594cd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06