Analysis
-
max time kernel
257s -
max time network
283s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
2b2fe172fc3807bee7dfcf3e0aaa26ad652a61f97c39849c3ce5b758b3b61577.html
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2b2fe172fc3807bee7dfcf3e0aaa26ad652a61f97c39849c3ce5b758b3b61577.html
Resource
win10v2004-20221111-en
General
-
Target
2b2fe172fc3807bee7dfcf3e0aaa26ad652a61f97c39849c3ce5b758b3b61577.html
-
Size
7KB
-
MD5
9ab6ec97e550ef29608536b47e1ecd83
-
SHA1
26def28d3ebd2ad3465250dceb779d7f888f1512
-
SHA256
2b2fe172fc3807bee7dfcf3e0aaa26ad652a61f97c39849c3ce5b758b3b61577
-
SHA512
46f33dfe0f207b2381c4aaa46a9e4c21a4b2d16b3ab6f57c2b191f074669dc75129e082f2424e1d4d17c3114267777aa9536d05729363d4209336f526506e644
-
SSDEEP
192:ZJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLT:LSGabMPvLddLXuSwSTLdlLXugfo2KaT
Malware Config
Signatures
-
Processes:
iexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{7B038E4F-6BD8-11ED-B5DD-5EDCA19B148A}.dat = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7B038E4D-6BD8-11ED-B5DD-5EDCA19B148A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
iexplore.exepid process 1392 iexplore.exe 1392 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 1392 wrote to memory of 3692 1392 iexplore.exe IEXPLORE.EXE PID 1392 wrote to memory of 3692 1392 iexplore.exe IEXPLORE.EXE PID 1392 wrote to memory of 3692 1392 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b2fe172fc3807bee7dfcf3e0aaa26ad652a61f97c39849c3ce5b758b3b61577.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1392 CREDAT:17410 /prefetch:22⤵PID:3692