Analysis
-
max time kernel
0s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 22:30
Static task
static1
Behavioral task
behavioral1
Sample
4047d886c8242ddcd8a0031f453bcd58.html
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4047d886c8242ddcd8a0031f453bcd58.html
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
4047d886c8242ddcd8a0031f453bcd58.html
-
Size
62KB
-
MD5
4047d886c8242ddcd8a0031f453bcd58
-
SHA1
929d6ed25684fbd99d9c77b9c3f8adfa6b561ea5
-
SHA256
c796be62d1f68de6c62f0c99664dc09412d1bb6238441bfe303c19c3324b02ac
-
SHA512
b9d2baa62a78968646ba1ed5e75b00f75e4f0b3da7b8a53b1dab1f4d1ea62668a0b4e9323568a753f782dc4467f017b9caef75c29a94486f692650c2a9e12999
-
SSDEEP
1536:MtSXX8ud8pb8nd8nd8vd8UiTtMJbFTqVuwMh3DjnVSAFk:qTtobFT8
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{8A766DD2-A43C-11EE-BD28-FEBFAF1864CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1624 iexplore.exe 1624 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1624 wrote to memory of 756 1624 iexplore.exe 16 PID 1624 wrote to memory of 756 1624 iexplore.exe 16 PID 1624 wrote to memory of 756 1624 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4047d886c8242ddcd8a0031f453bcd58.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:17410 /prefetch:22⤵PID:756
-