Analysis
-
max time kernel
0s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 21:51
Static task
static1
Behavioral task
behavioral1
Sample
13e48d1510b8df2cc9cc92e51182ed02.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13e48d1510b8df2cc9cc92e51182ed02.html
Resource
win10v2004-20231222-en
General
-
Target
13e48d1510b8df2cc9cc92e51182ed02.html
-
Size
3.5MB
-
MD5
13e48d1510b8df2cc9cc92e51182ed02
-
SHA1
98a8a53cef94226f89e590a1ec2bd631c2d4af7f
-
SHA256
d49e7afef9c4302a005a0c29227d704faa98e6732b04ba3a9c0bd03f6726d388
-
SHA512
79074c19a70265567ca6f0fedebe27394958ebbb4467d5b9450847c5ab726fa7aabb7b70e54fc939e9e629e022bfbdc8980bd49f0781e097069dda7b31566b27
-
SSDEEP
12288:jLZhBE6ffVfitmg11tmg1P16bf7axluxOT6NAQ:jvQjte4tT62Q
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{69D48D81-A2D5-11EE-A0B6-DA96C499C6F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1720 1620 iexplore.exe 19 PID 1620 wrote to memory of 1720 1620 iexplore.exe 19 PID 1620 wrote to memory of 1720 1620 iexplore.exe 19
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13e48d1510b8df2cc9cc92e51182ed02.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:17410 /prefetch:22⤵PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c6bdda3f990d9f4af799c6780b8859b4
SHA1a621164f6b814af5e867c84e7b014695c850fc7e
SHA256bf1d3d4bd2bfaf7e1c3ecda4669a16a68da4c2780c49c60b09d3fbc13a1633dc
SHA512955019d37611587f11831068a20a8b7f2a51838d6c11d02c822aa752fc056ba1336ce2d8f1e7d338fee9b3c9b11889ab8c615a1f60183f27cb060b3976033443
-
Filesize
9KB
MD5793b3a510849380014d3c2ba72084112
SHA18314458da99c20287502b690fce20ce05c1ff241
SHA256f3aaa63f916ba679d0bdb7d6a80a4dde256e1c4d36a2e4f46fbf4763e0f9c0ee
SHA51289ed49638ca021aaa4e5222d6045c0f24c6118c603910ed7fc3e508c4eca704c7944578a026f0b9efb7d8fbd617a2c563c49cdc4e39b6055cb55377de4edc6ea
-
Filesize
12KB
MD56c01714e4d3e95b88fcedc1245acb539
SHA1d2561bfb8fa9854d032545fe0c9b4732bd39dfd6
SHA2565d578979247bf1d22a63858691f88f2a606d585715bbb9f885493461cef9594c
SHA512051ee178d3c4bf8f8d131d00961112dc2ffef7cc86cb2cd7fbc6e5305f9c5d8945f996129611a38b2880d824c730bbf979d4879b837b159fd79c32d754eae74c
-
Filesize
1KB
MD534fcbf783a28492029355b3b9d531d9a
SHA1248d8cc67cbbeb125879c138431b29512430879e
SHA256024e0725a419096f7405879e795f8bdf64c0c243044d3ae6ebdccd08b0df688e
SHA51259f613886e4a16f6c80ac0a7930892d296a16b4191343dee9e66632ac12f73d8355e6244101f2e1149be946d7d8979c9b48ca04edb163d4a40028fa3d9d0fa9c