Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
005a679386953100f6831b0f4c70b6b8.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
005a679386953100f6831b0f4c70b6b8.html
Resource
win10v2004-20231222-en
General
-
Target
005a679386953100f6831b0f4c70b6b8.html
-
Size
20KB
-
MD5
005a679386953100f6831b0f4c70b6b8
-
SHA1
468325239c62cf5866293c29c26cddcc706f9877
-
SHA256
959f9ee8312be145f8967a0299c450b0672e72d2fc6aefe99997a4d425f6f12d
-
SHA512
ab9788241b727df90e8e90b26712ce285728018d840ddb53cae980d5b82cf5173949f6dd952a61fb25e3c21d3fb73ccfb8939a4c013de2e7607927f5d139ca33
-
SSDEEP
384:SItK75vSdCiISlKxslW3OHPCzRtZ+Kxjl4LtxyRNO:SB7pqRdmKutBxj+yRA
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D07C8C67-A268-11EE-A0B6-E2FF52840C3F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4552 iexplore.exe 4552 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4552 wrote to memory of 2488 4552 iexplore.exe 16 PID 4552 wrote to memory of 2488 4552 iexplore.exe 16 PID 4552 wrote to memory of 2488 4552 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\005a679386953100f6831b0f4c70b6b8.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4552 CREDAT:17410 /prefetch:22⤵PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eb67baf06a1d94f22035da0b59a13d1d
SHA168948612d15d7eea6fbdb80371d9c7f78ff9b189
SHA256428769b8aa88bd8024d80218948cd9af21332cc919bced628a7d8261aaffd800
SHA512cc0f8e6fc3bb6765993e1074b4e34e8de49acb9c771635c02f3471249eaddd6c5a549cf492ebddf1af2e90d82cdb3f7a603fc0443334b9d4131ca78c50a085a3
-
Filesize
1KB
MD5c6bdda3f990d9f4af799c6780b8859b4
SHA1a621164f6b814af5e867c84e7b014695c850fc7e
SHA256bf1d3d4bd2bfaf7e1c3ecda4669a16a68da4c2780c49c60b09d3fbc13a1633dc
SHA512955019d37611587f11831068a20a8b7f2a51838d6c11d02c822aa752fc056ba1336ce2d8f1e7d338fee9b3c9b11889ab8c615a1f60183f27cb060b3976033443