Analysis
-
max time kernel
244s -
max time network
337s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:19
Static task
static1
Behavioral task
behavioral1
Sample
946b2fabf044f086572d4465674b2aa1d8965738893f27a591544ae91e0a213f.html
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
946b2fabf044f086572d4465674b2aa1d8965738893f27a591544ae91e0a213f.html
Resource
win10v2004-20221111-en
General
-
Target
946b2fabf044f086572d4465674b2aa1d8965738893f27a591544ae91e0a213f.html
-
Size
7KB
-
MD5
e91b590f1c6cc8975e89796adca44b91
-
SHA1
727466e2d1389576df7d1c9d5d9d1f03c7c3c030
-
SHA256
946b2fabf044f086572d4465674b2aa1d8965738893f27a591544ae91e0a213f
-
SHA512
a97e94614f6e91070e1c8b0c34677a2bafcc49ddc18d597d3b097de5ecbf8eff944f377a9aabd788a3d18a84e95048b359a224525a2cba9a5b43ba4434ad67a4
-
SSDEEP
192:tJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLI:vSGabMPvLddLXuSwSTLdlLXugfo2KaI
Malware Config
Signatures
-
Processes:
iexplore.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A49AA48D-6B19-11ED-B5DD-DE9E83FE850F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{A49AA48F-6B19-11ED-B5DD-DE9E83FE850F}.dat = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
iexplore.exepid process 4452 iexplore.exe 4452 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 4452 wrote to memory of 2124 4452 iexplore.exe IEXPLORE.EXE PID 4452 wrote to memory of 2124 4452 iexplore.exe IEXPLORE.EXE PID 4452 wrote to memory of 2124 4452 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\946b2fabf044f086572d4465674b2aa1d8965738893f27a591544ae91e0a213f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4452 CREDAT:17410 /prefetch:22⤵PID:2124