Analysis
-
max time kernel
0s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
1bed396d31887b82fb67745a0d82f02b.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1bed396d31887b82fb67745a0d82f02b.html
Resource
win10v2004-20231215-en
General
-
Target
1bed396d31887b82fb67745a0d82f02b.html
-
Size
22KB
-
MD5
1bed396d31887b82fb67745a0d82f02b
-
SHA1
9b3303372a1da45e17647297e2a8444e62b18281
-
SHA256
0269815859504911c6643b2f9edb8e212ea8a4059a1eae76a722eac51e8bbefb
-
SHA512
f933695f9abb044130acbf753469298750101b4f555c26a17aca7a3c594af4c60b1b3fcde111f0847b2f9365b9c02db717cccd6785f8f35a47ad0f49aaa7251e
-
SSDEEP
384:I7Geh9xcB4SlifmsOSv63g7WDM4GgHG1ultBxA1:I776lTc1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A12E9DB5-A3BF-11EE-BD28-4643CEF3E9DE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2024 wrote to memory of 460 2024 iexplore.exe 16 PID 2024 wrote to memory of 460 2024 iexplore.exe 16 PID 2024 wrote to memory of 460 2024 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1bed396d31887b82fb67745a0d82f02b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:17410 /prefetch:22⤵PID:460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5afd9beec8a48f5343d69e95bb2d440c7
SHA13a8dca5900267ff715cb41c2206192fb386ee063
SHA2563a6a31f847b4f6c1b3eaba0b1b121256e24cb1c7f4c249ada380bb1170991bdd
SHA512c6db0daed31a4ad4a8fa5c61f33ba2b4b855719a49c030812818355928a0bd99274da5a2e0146ad0cd77df07ff8847854e60cc38e3fc8cdf7e899fa8d83514c8