Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 18:02
Static task
static1
Behavioral task
behavioral1
Sample
99c884ebcde735b03c92b36013dc55ef.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99c884ebcde735b03c92b36013dc55ef.html
Resource
win10v2004-20231215-en
General
-
Target
99c884ebcde735b03c92b36013dc55ef.html
-
Size
19KB
-
MD5
99c884ebcde735b03c92b36013dc55ef
-
SHA1
056f9327c50a4e0ccb2a4336d403ff35caa4e7f7
-
SHA256
e71ba63e0c9c7ce44ccf76e5612b205c98f64ca2e39a168851e00f170bf29e72
-
SHA512
953276d2b51513b68b9488803b886933744fb1cebef9cf60d3b1c1fed004743c0ea7d3956a6506b881653ff52aef6210036ef42440418994029ca134c03b291f
-
SSDEEP
384:nfnYdlIcv2xt0g4HkWGTHDU1TQ2PM/gbBLOXguLZ:0R0glExLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{204E97E1-CA9A-11EE-84BB-DECE4B73D784} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414009249" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1172 iexplore.exe 1172 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1172 wrote to memory of 2416 1172 iexplore.exe 28 PID 1172 wrote to memory of 2416 1172 iexplore.exe 28 PID 1172 wrote to memory of 2416 1172 iexplore.exe 28 PID 1172 wrote to memory of 2416 1172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\99c884ebcde735b03c92b36013dc55ef.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543dca7939e4b9037d10eb469663995aa
SHA1966f3724bd0eb75eba29f6b865908e36d6eef437
SHA25674977c832d4d2613409a330b1464179078aed80c8deb1766468d302a68a6a696
SHA512c5819d880b1e281d56fdcd44e1ffde555360a37b67175ad82128b61c321f599e8d6957772b2abee842d5511361bcb5a6fbc6219427408fc04ea0a8d0e551546f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed30df1d7a7bd02afcd03dfb6199411c
SHA1e243e5ccf6589f25cbd8583d90a6e4ee3dfc4383
SHA2565f6c2691368256aaf6499346e506e1a514c43c33b8a4411f9097bd99fda7fb68
SHA512198eb5f21e1ed6d54e83262f1fe42e73a2137dbf87cc357b27e37bac14c44ed5fbaa01ba91d0fd174431f6cbe9873a136e7c7455cc99742c895db093904d2a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f840ad41bf13d5b79e1920ba206b2d
SHA1ac586377f094d6e10a21a29d0eaaf599cbbd49ab
SHA256b6c6d8b366be04ba2c730238c7f47938199da3ee2baddf1b35e0375f7deb2cef
SHA5122a2f44a6fe3f3583ebee886a3e8580bad61c0a46220390829dbe793a30d5a5c876a493b415105d98a2f7972a47f2814ae9919a692285acf79e202bb1f2d75e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a333362628079fc6eae8c907f00e9079
SHA10f36092b98f4eb691b702fd1ff6d689927fc4d1b
SHA256fa5816385ee394d61a3c9406538f454a0e5265f10df832bb915c0ea92fb00b09
SHA5123861bc8b3a6a1fe2bb185eb3222ac432a341b8989ba92a89eef988502c94a640a280e2b1687cb111a5aaf2b96527657661414d91c23bb855cbb7eb62772dd1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51467c72eeb6290c207518e089329c97d
SHA187d6ee77307330f74289397a553aaaa8734a6f31
SHA25673b33dc4aea3e1f2e10f00c9df701b6da688a942defad8071f617b8b1ddf6849
SHA512bd406f502c6f52e2c7e06654a81e82f2fa908680a62f38b6f6052e04ee2104ac503b70da76ce12f6ab846911748e5b194e2bb7a0e84e7242ba374ed8cc01943b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576ff99574c9c3d332e575111f71a552e
SHA11e04f8350c9ee7b83d997326bb095af17c186005
SHA256b7fc03f916ea4ee9cb0db9f2584aa2d163bda40e2fe5b9187566e2901b78f0eb
SHA5120b76fc84aacada27ee667cae1bf55dffc1bbbd20a75cac584e4be221517c2b97a64cea7ec09fddc01283bda8547bf87cba4cbd399358bda0ee277f85c7bf4705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52334eeeeb4936e44518d7090a458a0f3
SHA125300e4eba807c0fe8a0e1836d8108933fe3c9d0
SHA25634956c3cab1d705abdb828e44be8ec33631dc4047b5890b0f05a2ba018f302f8
SHA512cf20624ea7e1ffeeff81603d6154b2cdcff25306e40d49e0101820cb32f3f4ae68bef0189b690eb40e64bcdd6a2c2a9002d7ab2b1f17b83fb7fb076d4d37067b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5841c4f90effc63c707afb2140074de28
SHA1604c8b000621b3e2a1879140fe0813a0055bd0fb
SHA256435b860eae6f29ebf14bab32c989bf3a3e411f226b92f2864b0b8ea1b807e4cf
SHA51219ba4f20708704d7d0ebc3db3754e2f7efe5b88cf028832a9cacd29285a4d68547cd7a535dada13ff5b4bdd16c58ee28401ca19c3bfacdfd688d434b7a909a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c08b66dc53d38dbc78d7b046f705b2e9
SHA1f303f15833ce791edebefb25de4fa742455e4f7c
SHA256bb8c34ecb22bea2b30588c9061405fb4950c3fae4d3dd3f94a5a2d4ca2016486
SHA512252e92716689b2c61d826e6a207c2557b058da682bc38f5383a5e838502f5375f0d31f283039002f61e7ab5a3ee103839e34b25fe88165d90235e4834f868eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be7b96bdef369b465d3fa90b791703ee
SHA1e0a2c00262ab037c25c38c35b56d68a494559805
SHA256dccf21409d3deb44fde2706e8ca6115d32fd7b7d4a055902aadab0f18779ac95
SHA512d827ab5c93a21636fad7d57bc61807b183d8fc1dbe0d3b51b4fc8dfc984cbdb551bfdd29c813dd87af10f3ebe220dfcaeb6e348b7b98cd9c5f7bf6724198c736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4b2f20966fe1e016f000ea01de4237a
SHA118cc56442a6c21244ba0c27f35364af513d4761e
SHA256bd25e4b2953d413918e3660c6721cca0915874a675ad928b25eb16f9693fac2e
SHA512b2941d779682a8efa0f7e0ab472a94c1a5a115ec5f2c1052b6eccc78b1a7e6868c1c27a7164d5a259edd30d72a9ad8d9ccc21c17cd27a63f1151df664165bc93
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06