Analysis
-
max time kernel
49s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 13:32
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240226-en
General
-
Target
.html
-
Size
42KB
-
MD5
3aab816df2fbde696cae55e7820515af
-
SHA1
4c61e591785b7a0e4aa6d48b880fbe2fa52e9b18
-
SHA256
7d5e611a692e69959e886618ab8a1fff3b496b7b3db32fae60b3755b55f3ef49
-
SHA512
dac00236a741efa77418f4a7667413da9ab985c991a8320fe7561c6671daa84d73d57fd13498ca1be0d17c3bb57da7c5433645c5a735f7daef9c9206dd8a1d2c
-
SSDEEP
768:WdpqmL0Id3AAYEpk7IqcdP0Mad6CZ4VWBCW3KI8iCfJkPVoEAd2Z4VWBCW3KI8in:Wd8mL0Id3AAYEpk7IqcdP99CZ4VWBCWJ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07f7fe0ca6fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0400BB11-DBBE-11EE-970D-EE42DE2196AB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000008a8af89975d329563f02bd3aef066713daa92f9b80d69a564e6b7880cfe31af000000000e8000000002000020000000b0ca9ff86b803a27d2fef6e177159036cc2451f2226871506f8886b7e2d9d4c720000000c4e14a989cf055229add75c8c9cc83444f2763806abb4684b9aea3962600349240000000d95da60c882340783b067f29b56fd83755776bd601da48d4ecabf9ce8981524418b1c5d48c581cf3120660da2ee78ee685f4331415b5e23285c235303bdcce26 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 3068 iexplore.exe 3068 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 3068 iexplore.exe 3068 iexplore.exe 3068 iexplore.exe 3068 iexplore.exe 1056 IEXPLORE.EXE 1056 IEXPLORE.EXE 3068 iexplore.exe 1056 IEXPLORE.EXE 1056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1720 3068 iexplore.exe 28 PID 3068 wrote to memory of 1720 3068 iexplore.exe 28 PID 3068 wrote to memory of 1720 3068 iexplore.exe 28 PID 3068 wrote to memory of 1720 3068 iexplore.exe 28 PID 3068 wrote to memory of 1056 3068 iexplore.exe 31 PID 3068 wrote to memory of 1056 3068 iexplore.exe 31 PID 3068 wrote to memory of 1056 3068 iexplore.exe 31 PID 3068 wrote to memory of 1056 3068 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:406548 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52503b3a449993f58f89cc69afc3fd8c0
SHA13c8883c97023d8df5b0b9b4f0e2e2ce9b4ace119
SHA2564e4265f94bfc3182e16a856f87dd7d462a2cbbc454a4fc5d9926b30a28111592
SHA512fb5822d95f276a1890947a39ddff0bf3b606aa3cf830f210098e20673258ce766108ab1856a0a7426fe0f1bdffc9f7e3ec386b0374e834249b2acbf70ce4656c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b186ffc5bb7686273cbaab3ef797f90
SHA1219142c3e4fda3508120d93c81c148439517f857
SHA2565a68fa2c0c5455fa891a6f53d10c56d1a5f4a149967b7152d13f24a77021872f
SHA5121fecc4b78590bc9c7fdf1d81c980458ccda7482668f02f1c8a1f903bbacbcd35838f12fd71ed8d4b829ab25678765461e4f2b56a1cb82d6b02969ef80e8c2b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593e70a003dcb87a06e6430cd6002dfb8
SHA1d6861bf59500709da284329cc6bfa2ba7c797f7d
SHA2566764dcd9115bc2a94edbde1b28bf5105f1c4da032d04bf0e62a5a057d9bed38f
SHA5124f158b479da3456d4dc81f9db8659225c1662fe388e9f78d25f714e820b9b67bc2d12401da75db516c4eced55ac402934bfc4cd836f77a073a4affe1c5f8f386
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63