Resubmissions
29/09/2022, 21:36
220929-1fwnkschgj 129/09/2022, 21:29
220929-1b8scacad9 129/09/2022, 21:26
220929-1agbpscad8 129/09/2022, 21:09
220929-zzeczachdr 129/09/2022, 21:08
220929-zyvzbschdp 129/09/2022, 21:02
220929-zvwrfscab5 1Analysis
-
max time kernel
30s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2022, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
Claim_Copy_4958_Sep_20.html
Resource
win10v2004-20220901-en
General
-
Target
Claim_Copy_4958_Sep_20.html
-
Size
744KB
-
MD5
ddf5dcbc26beb02424101daddcb156ea
-
SHA1
ae8a95ddd3e694b2fa182b37bb56f9fbe27c61e6
-
SHA256
2468e9a24b9683e210b96542adf891839cece4418d1aa45b7117576971659ac8
-
SHA512
20a20b48df3e7fb93ee71f582704ae733c00616742f7b03ce063049bae77168d046ce315be874b0a4197553b3bf358107e044ad37592cbbd515cc192b8c04794
-
SSDEEP
12288:z6hZWwP5NgzdjT+Wnt4mkZK8uWpD0humBbEAEevW:u35SzdjT+1RZK88gmBbE5ee
Malware Config
Signatures
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 89be75672cbed801 iexplore.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D9E53859-403A-11ED-A0EE-7ADCB3813C8F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{24DEC8DF-34E9-4243-9B88-556189679D77}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3444 iexplore.exe 3444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3444 iexplore.exe 3444 iexplore.exe 4996 IEXPLORE.EXE 4996 IEXPLORE.EXE 4996 IEXPLORE.EXE 4996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3444 wrote to memory of 4996 3444 iexplore.exe 83 PID 3444 wrote to memory of 4996 3444 iexplore.exe 83 PID 3444 wrote to memory of 4996 3444 iexplore.exe 83
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Claim_Copy_4958_Sep_20.html1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3444 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\47NRIJ2V\Claim_Copy_4958_Sep_20.hc9jlh6.partial
Filesize391KB
MD580b44ac80643c7ddf6b39563a72a6097
SHA17d35a374f44608ca7ad6d9215f1b7b8a3d6c4b00
SHA256f14da36feb9ebb27d63747326dcaccc114ba5fa4923d981675d4f400e679f0c1
SHA51221bfa8eb13194b1d2f0264951159a91b76975ac04a0f05aab513d6c3b31ae88c8a8673b12cdb431e2c571ad2705676d3975136b1c1dfacedccb6ae974615e9a9