Analysis
-
max time kernel
0s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
1d6acba448d3fcd2f3187a611e149947.html
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
1d6acba448d3fcd2f3187a611e149947.html
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
1d6acba448d3fcd2f3187a611e149947.html
-
Size
254B
-
MD5
1d6acba448d3fcd2f3187a611e149947
-
SHA1
c437425a74692a4f2bf3d7dd2931e5176c799682
-
SHA256
6748d8ecd20cb131f3f647aa52e880f5d7340e0a8ec6915b7179998e77c3e024
-
SHA512
b32623fd68cccf18a65ba0fd7e1cd60204d5a2a247f2fb6a98a1477a57768b1ea6548ebae9715fdc768a3939f8a37c62ed822be17c484c95926deadce873ab13
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D02B1F24-A302-11EE-9ECD-7672481B3261} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4580 iexplore.exe 4580 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4580 wrote to memory of 2980 4580 iexplore.exe 18 PID 4580 wrote to memory of 2980 4580 iexplore.exe 18 PID 4580 wrote to memory of 2980 4580 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1d6acba448d3fcd2f3187a611e149947.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4580 CREDAT:17410 /prefetch:22⤵PID:2980
-