Analysis
-
max time kernel
0s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 18:23
Static task
static1
Behavioral task
behavioral1
Sample
0b8f6f82c61ad06dd548cf33879a05ab.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b8f6f82c61ad06dd548cf33879a05ab.html
Resource
win10v2004-20231215-en
General
-
Target
0b8f6f82c61ad06dd548cf33879a05ab.html
-
Size
45KB
-
MD5
0b8f6f82c61ad06dd548cf33879a05ab
-
SHA1
21bc3d516864727dd5f60b71da9bdf107d2565e1
-
SHA256
e56be4dd367b350e8561185512f0b62151e438d0916c15c5d367e15a1b437ca1
-
SHA512
d57fb75178a83c36a9276df202cda277528623de17746ecab24f3c7a76ea2b883c8e10a2b5201abd0329f2c032ff40540dd234743cfea092b28a85fc0ab55f68
-
SSDEEP
768:xwnSv1+gPTvVw92HqGtXR28c7GqxtkcrwEf+gct2sI+7bKa0koJisLeMatddDShx:xwnSMSdKdG9crQ2wEf+gcA+bKa0VqdM3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{EE3AA95F-A2F5-11EE-9ECD-76CF25FE979C} = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4972 iexplore.exe 4972 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4972 wrote to memory of 888 4972 iexplore.exe 16 PID 4972 wrote to memory of 888 4972 iexplore.exe 16 PID 4972 wrote to memory of 888 4972 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b8f6f82c61ad06dd548cf33879a05ab.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4972 CREDAT:17410 /prefetch:22⤵PID:888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD54473882d04a476f102efb14160d07dc2
SHA17bf2ff1af3c0700991cf6c3b6a260a8b28d934fc
SHA2567a7d74d3ff4c602571e96a98c4c7292ee0094833d9fde722147c0710002a1e03
SHA5124e0e070e01bb848d8c0eb7cab86454f7dca7082a235972631f2a1fb27b750f71656ca727e2f795993de4fded51fee7a7756e9cf99b4d6e5679d5493f88ee56d1
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee