Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:27
Static task
static1
Behavioral task
behavioral1
Sample
4e13aa86f4987d6d3cad58f0241d7b33757467b92b732350488809f528e707d6.html
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4e13aa86f4987d6d3cad58f0241d7b33757467b92b732350488809f528e707d6.html
Resource
win10v2004-20220812-en
General
-
Target
4e13aa86f4987d6d3cad58f0241d7b33757467b92b732350488809f528e707d6.html
-
Size
7KB
-
MD5
40add463a9c7f983d609f6c7c9462cc0
-
SHA1
dd80690060cbaa0878525aa78cd64e6ce433b685
-
SHA256
4e13aa86f4987d6d3cad58f0241d7b33757467b92b732350488809f528e707d6
-
SHA512
8db614d929832347a9b9b6dda1f8d766f71e4a0fe32c55e121ffe08c1211c6860035e7df73eb815b377943b4741031066b6db1dd349c4f2271144e60fd2e7b7a
-
SSDEEP
192:8JSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oL7:GSGabMPvLddLXuSwSTLdlLXugfo2Ka7
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375361637" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ba597227ffd801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4005a67227ffd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9C5D46F9-6B1A-11ED-B696-F22D08015D11} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ad977227ffd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000026244b91e0ab08468ab8dfd1100abbdc000000000200000000001066000000010000200000000a349390b59197b3c39dffd2e558e496c2238d2abebb32996b3f68b1f1141561000000000e8000000002000020000000115d996966765cdd6429619277b0375ed61cf67e96fb3b96158851702fc536e620000000b09b825e0c4b5f06fe1845b3d25745b7266616cf38ffbb0ded676da838ca6a4d400000001f4de99eb67736e1d0b501d29d5e66c22ab7c4eb65b425e801cbef9e48f67d67c8c2492412f48057c2770ff517c69127d50dc5f707eee6b19739e8ccf59bcafe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000026244b91e0ab08468ab8dfd1100abbdc00000000020000000000106600000001000020000000278945384010ccb383b3f38d8b174b58dc9ce4ac456b3e11c25bb99747250dda000000000e8000000002000020000000e00fee689dfcbef3a7f87719170b634bff956b8eb8a8335f85a8f73f25b9a4a42000000061755a16c91e2628030f06b453594a28619d193000d5d08d472ab7d99cc4a4434000000066bbe32bdcff8ef3e95e1247318792524cf9cd56fee218b4f6bd742dbf337fedc0bad8c935ea2437b40b602d4f9130e9df8724f965d8e2747b3caa314910efb3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000026244b91e0ab08468ab8dfd1100abbdc0000000002000000000010660000000100002000000014b99dc6e58773142067fbc55c68e1398b2711cf3b6cc986e7f50ddf7b7d1b5e000000000e8000000002000020000000e45882d0c8a82541f5f097b4301857a1faba4944ffb91dc6c8831b773d51dc17200000008adf7dad3fce453d5371aa387a66a9b07a6b3b4b2a0674f748ca82e42c1a97cd40000000f39f008dfe74f8e70296dec88c6c1a19803bb486280c978d670f30ff63b090d5f1997e9f6ecc92ed159888c5c713e9d4d70352343fd304d1448fae7e5ba6dd35 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2008 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2008 iexplore.exe 2008 iexplore.exe 4404 IEXPLORE.EXE 4404 IEXPLORE.EXE 4404 IEXPLORE.EXE 4404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 2008 wrote to memory of 4404 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 4404 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 4404 2008 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e13aa86f4987d6d3cad58f0241d7b33757467b92b732350488809f528e707d6.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4404