Analysis
-
max time kernel
149s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 04:20
Static task
static1
Behavioral task
behavioral1
Sample
ce07a8409f6458373a5dc1643cb492875bb6c6a2cd98a2beb560930ee9ff7f76.html
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ce07a8409f6458373a5dc1643cb492875bb6c6a2cd98a2beb560930ee9ff7f76.html
Resource
win10v2004-20221111-en
General
-
Target
ce07a8409f6458373a5dc1643cb492875bb6c6a2cd98a2beb560930ee9ff7f76.html
-
Size
7KB
-
MD5
ea783c6e28f1388cc8b8e35d458b983f
-
SHA1
c19d8d139e2591195621a2a193d1a140db16c08e
-
SHA256
ce07a8409f6458373a5dc1643cb492875bb6c6a2cd98a2beb560930ee9ff7f76
-
SHA512
7a9514d1dda6cccf79e631e3fe117b47aec6396354fdd08e97d2df9e4db2f2d86d5b71ba2f05a5d0573ed71af2b92416dd752287e07065ed43a12de5067dc2df
-
SSDEEP
192:JJSG+9PzqN/PR1A8nddLXuSwSTLdlLXugfo2Ku+oLd:bSGabMPvLddLXuSwSTLdlLXugfo2Kad
Malware Config
Signatures
-
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{73E53467-6DB3-11ED-BF5F-D668443210E4}.dat = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{73E53465-6DB3-11ED-BF5F-D668443210E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
iexplore.exepid process 2236 iexplore.exe 2236 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 2236 wrote to memory of 1528 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 1528 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 1528 2236 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce07a8409f6458373a5dc1643cb492875bb6c6a2cd98a2beb560930ee9ff7f76.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:17410 /prefetch:22⤵