Analysis
-
max time kernel
2s -
max time network
78s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 23:30
Static task
static1
Behavioral task
behavioral1
Sample
19b68d1ff3f038134b8d7d4e50a1cde7.html
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
19b68d1ff3f038134b8d7d4e50a1cde7.html
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
19b68d1ff3f038134b8d7d4e50a1cde7.html
-
Size
254B
-
MD5
19b68d1ff3f038134b8d7d4e50a1cde7
-
SHA1
84480815b5179f53cdcaadc4c6ed7ca1847768a9
-
SHA256
82a23dae1afca66d9ae2c54ac85a0c27ab2b8c1e437dba040e9d0969f76f459f
-
SHA512
d283cff5dd58ed434734a54de573a3cdcfa66763c47a0ba14536f124ee730e5d91807f6cfd06e888070099338e7af11100446f1a00827d690baaa11327d9de51
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{75B4F564-A2F2-11EE-9A4E-7E4216712C33} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3896 iexplore.exe 3896 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3896 wrote to memory of 4688 3896 iexplore.exe 28 PID 3896 wrote to memory of 4688 3896 iexplore.exe 28 PID 3896 wrote to memory of 4688 3896 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\19b68d1ff3f038134b8d7d4e50a1cde7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3896 CREDAT:17410 /prefetch:22⤵PID:4688
-