Analysis
-
max time kernel
0s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 19:33
Static task
static1
Behavioral task
behavioral1
Sample
0dc608ef78486afe93dba50628017e96.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0dc608ef78486afe93dba50628017e96.html
Resource
win10v2004-20231222-en
General
-
Target
0dc608ef78486afe93dba50628017e96.html
-
Size
57KB
-
MD5
0dc608ef78486afe93dba50628017e96
-
SHA1
2a91259a2d4fa7fe41335d56b95c3b92347df324
-
SHA256
dc21896c814fc8b57182e2fecb134af7e0113e6895950ead640b62de12b6ebf6
-
SHA512
cb2a26e7da8ca97876a2aa78957138a695a864785a3d51c7b401ddb4a228dadccfe5f21379e470d48cad28a14665255345d4855dabf14c84d5673439f1dcdc6d
-
SSDEEP
1536:ijEQvK8OPHdsA6o2vgyHJv0owbd6zKD6CDK2RVroH6wpDK2RVy:ijnOPHdsW2vgyHJutDK2RVroH6wpDK2m
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{65CEF7A5-A311-11EE-A0B6-EA4D20080768} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4984 iexplore.exe 4984 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4180 4984 iexplore.exe 17 PID 4984 wrote to memory of 4180 4984 iexplore.exe 17 PID 4984 wrote to memory of 4180 4984 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0dc608ef78486afe93dba50628017e96.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4984 CREDAT:17410 /prefetch:22⤵PID:4180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\64E544B76338020D780BCC40A2A2B366
Filesize414B
MD58d7b8903cbfd66f6cf662233be964ef1
SHA135ac21796f5c5e81afbf57e2cd9ee8e64689e6b9
SHA2569e61d50ccc1465bbb6777993a476343cafa54e7618d3f04545aa44a9d4366a57
SHA512d16ecc69254135370399f29613fea028fa62264f095ac1ad86c993dbe9b3bafea6b0b915261f05d273fce08eba9472df5cd65164506a87b628fc34c34d05a773
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
165B
MD52ca453b094f77b5d39b7cd2b8235b3a5
SHA1f6c763f31492911d6d1fcc77992fe674e10e67de
SHA2566c70cb594d4e3990d7a48472cbc4bcfc46ee591c48a040b6bc545ff3ff91b422
SHA512e61726d055310f4d57ea57666858a32c7c06444cebb72f06dd7f3ee9a2aa82e28c60f22ca82659229390a380ec2dbcfc289b14479ed0a1abbd50e5d62b3cade3
-
Filesize
1KB
MD5c6bdda3f990d9f4af799c6780b8859b4
SHA1a621164f6b814af5e867c84e7b014695c850fc7e
SHA256bf1d3d4bd2bfaf7e1c3ecda4669a16a68da4c2780c49c60b09d3fbc13a1633dc
SHA512955019d37611587f11831068a20a8b7f2a51838d6c11d02c822aa752fc056ba1336ce2d8f1e7d338fee9b3c9b11889ab8c615a1f60183f27cb060b3976033443
-
Filesize
7KB
MD5abf2bb3c6b729294e00da3b5060e0c58
SHA1dd5e75fa1c1807ffe36ae70100a034f57a2b426f
SHA25603e7c68f128dc1ff8dcffbfb477a81746a70e094b02c4253aa09e851fd6e8189
SHA512406cf31732b0c05b5b472071304f3f2e6e316942aa8909e0003eb2108d8a11e93d36b3c7da0675451054207e5afe8f7c36705471bdc544969e887ab3918bc045