Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
9c5763aa046b4d7d3ee021fe433bb21b.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c5763aa046b4d7d3ee021fe433bb21b.html
Resource
win10v2004-20231215-en
General
-
Target
9c5763aa046b4d7d3ee021fe433bb21b.html
-
Size
70KB
-
MD5
9c5763aa046b4d7d3ee021fe433bb21b
-
SHA1
25c7812d669e76067398837871c266c0f5a22664
-
SHA256
14f078636d543f2689bb0ebf2cebd5e47649173c7fc8d337d2fec6733468ec3a
-
SHA512
16fbee2c64652063e30b97193081d089157bc9a30e7c7821e0efa1e2a934701e306504e10750fd52ba06dc5461a0b16cf6e6d5ddd9c0e318ffb3a8893202ec0e
-
SSDEEP
384:Sd+R/i08YfQ6qfbcnTs/6t7m0l5Lvl71kws/7RcXBct:Yuf4AEF0bPfq7G6t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B6056B1-CB66-11EE-9005-D6882E0F4692} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414097020" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2760 1992 iexplore.exe 28 PID 1992 wrote to memory of 2760 1992 iexplore.exe 28 PID 1992 wrote to memory of 2760 1992 iexplore.exe 28 PID 1992 wrote to memory of 2760 1992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9c5763aa046b4d7d3ee021fe433bb21b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5c2ebefbc6da2aef0e7b222497021ab
SHA1ccf662a298924bde3a9df055d8ef4862a2c576bf
SHA25646498d2afc0538e547a5a254ea2386dc0101f8411de26efb407bf27555ead7d3
SHA51269842b83384d061e8c19c6089d3f5c0a418ac7ff8d76ee83297ace34ccc81fbef6b451f6eb9b9a9e076e8255a1dba912070205aeb6cdcd97fb1633df778de7b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599d7cfd19f8e6d3f2ca57f588bb233d1
SHA1b2420ad14608ffd32c71daa860584ba270089d91
SHA2565180f2a7fbc0c4ac2ce10440466c474a8a922becf36427e6064ab20a907296c7
SHA512133b7e9d56f690bde9166893ffbf743499e4e281abdb1123ce3e6ed54858a3b57421e89029a2c6dc58f4522f4865aca5c0f1cc1cb7dbbc1942646aefcd923fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591e228534bb5bf57bc634d0e9c9eabff
SHA13e2510c1460c63ca6dd0fb3af2febb75a5c3afec
SHA25665fae89d5b828b082fe1cc221e0504bd6fe75be7ce4f1c541acc429cfd55d627
SHA512d9da3d42abaa6bb0fa956274d811d0613cc51d7c5128a95bc60f0d1801d704b45320868e3f49b892ac26f0c577d80df2007c3190d41213c0737627ed9b4dfd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5ce6508ad0559854efeb7ac2f463bc7
SHA1c84660e16065ba56ec0e3854f3781488ed8e9a0c
SHA256eb77670d2b2b97c6290c45ef5dc8bf0cf0468344d6726d8748918fbe15b6d3d1
SHA512c66b914814b80ed68734bb4a029195c1e7757d9fdf4fbb1202f5ebd68edc4a0aff3f3b42a52e3ff5e4b06636590e867d078e316598a711337f4cb87d830b4805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5993b08a79c663ffaa99171b3bdff8ed5
SHA1a73a1083d3f1ac31fb2336fed6b88011184a362d
SHA256567366019d299c1b9bc838136250fd34dcba212e5a161eda22f404384d7894e6
SHA5123e2ece014e92b42669062d9a17aac7c15d3af53fbb7efe9685dfa4939474d8c8a5a95e1fe1cd997269c9c59d43e191e39cc077d3d04c7099ccccf20399ff3182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2db0dcdc6a30a44635b99c5145d6891
SHA1e49e211e3e3c1e4348ee0bd2d3c6fa36576db6ee
SHA256237e998ca09f12c63e714cd7329301096aa5d5647285dea7eb26f75ebba5086f
SHA51245a6f08d63f85c2766c60a4343ed4769c3c52cb69a8c960df8b80a458937ed4ef24eee68e9cf2bd20f74f59800dcb57dc012ce6718dd9d02463f6fde0be70593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53b502eff4530f5cc441ad47c0808f0
SHA1d2f4a986920a988b89e70276735425d111c10959
SHA2560eb8a6c37aa32a01c3d33e49fcf4310ac20822563975e6d020bd7cc817d84f9e
SHA51228b0fcb2e47a4b58e7e9953cb26b093d0c4ba47cf8725386499ea86474660d627151beecc78bc02cba6c87b76eb4ef3c1f7339f5da3b2a9b30e0a3e76469941d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f485dec4e76732d6305bfe0503494cbe
SHA168a627d416548b854bed59b2df3e70fa23f1d086
SHA256c6b85b509d7874873327aa86b611117d83042035bff3a6fe4784dbe0fd8a53e8
SHA5121ed647d3a4500c9877573ef3cd3e0832a32bcc9773631281f33bc31c15d3dc5017d1bb352e670a88452517da058235e76f03fdfe14ee0313419f48d956cb1385
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06