Analysis
-
max time kernel
296s -
max time network
413s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:24
Static task
static1
Behavioral task
behavioral1
Sample
dc710e0741b59e962564efdad0d794fb46c1f27bae7f79405088ad53b77a19d6.html
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
dc710e0741b59e962564efdad0d794fb46c1f27bae7f79405088ad53b77a19d6.html
Resource
win10v2004-20221111-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
dc710e0741b59e962564efdad0d794fb46c1f27bae7f79405088ad53b77a19d6.html
-
Size
91KB
-
MD5
243dbbbf7e0272c2f9fd5b1728b2adb7
-
SHA1
99c8e81e58b556c91cc37946a6db7fc2061e739a
-
SHA256
dc710e0741b59e962564efdad0d794fb46c1f27bae7f79405088ad53b77a19d6
-
SHA512
6e438e8b0594122b7cc81ed364012c972701af011d935481b4fee81f690d7c4d3e6275ea63becf5582d75623bbc7c90acb09d737917a927cb5f2acb2fdc083e4
-
SSDEEP
1536:VQU1bSQfbH53okgZCSzmhNly4grfc4sAyN+cfEhEYf9a:hT5vh
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3A8B811A-6B77-11ED-B5DD-66300FA194E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4140 iexplore.exe 4140 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4140 wrote to memory of 2572 4140 iexplore.exe 81 PID 4140 wrote to memory of 2572 4140 iexplore.exe 81 PID 4140 wrote to memory of 2572 4140 iexplore.exe 81
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc710e0741b59e962564efdad0d794fb46c1f27bae7f79405088ad53b77a19d6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4140 CREDAT:17410 /prefetch:22⤵PID:2572
-