Analysis
-
max time kernel
0s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
0b4446d29e64a6d69be044db24e58264.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0b4446d29e64a6d69be044db24e58264.html
Resource
win10v2004-20231215-en
General
-
Target
0b4446d29e64a6d69be044db24e58264.html
-
Size
18KB
-
MD5
0b4446d29e64a6d69be044db24e58264
-
SHA1
5676bdea7c05daf131da058d239283efb275183b
-
SHA256
e893a97a4d76ec96806b26d157286f690e0f8849ab2ee4e6c1c20785af6a53ee
-
SHA512
33edce9ef18dbe6c7208f3f089c0c65d1908366496587325d3cc060751ea34a064d3f012cf0fa350b1f22f0ee130f09bf443dc0f1830671d54b847e668276d37
-
SSDEEP
384:uwLAIjlHKkjtC3LTEhihERdBxfJ8xGJ8xPhdXJ8xZJ8xxhA:CQ
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{89F5984A-A2A5-11EE-9963-CA152A8DAB80} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2348 wrote to memory of 440 2348 iexplore.exe 14 PID 2348 wrote to memory of 440 2348 iexplore.exe 14 PID 2348 wrote to memory of 440 2348 iexplore.exe 14
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b4446d29e64a6d69be044db24e58264.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:17410 /prefetch:22⤵PID:440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD55ace9c393a09938e87096cd455d42bb7
SHA15923b7449ef84cd863920dd5bcd3dda862652c01
SHA256da208ba6a6e47ed6335bfeb82d4ba17a69b1cc27e5b58cb4d7f4c61077fe6b31
SHA5120d657af087ec3fb1351d1d0ded9aee558976396628af3183c0b46fc43ecff42621c2524f0c55517f9c699b2848dc6156b189d851f6379b47e5e0bcbc12ba2598