Analysis
-
max time kernel
24s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
03260e9a1a606376a86565684882736a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03260e9a1a606376a86565684882736a.html
Resource
win10v2004-20231215-en
General
-
Target
03260e9a1a606376a86565684882736a.html
-
Size
4KB
-
MD5
03260e9a1a606376a86565684882736a
-
SHA1
a61475462129271cd8720858dee7fbe65785728f
-
SHA256
891845466e0a1069fc461ce13dde43372bf860a1596b036412abc567d7705664
-
SHA512
3c12f07e616a47e0301e6799ce343d62d377aaa3dbad4435c95dd02b13cd75cf9f48da2e908b6ba08771db1553c325cd6fa4d5938adda8533c842eac7c660d60
-
SSDEEP
96:SXg5xFszkSzAOZRuNtZJkj/g7HMlzflNzfnLHMMym:SKxFsoSEm8NFW47gTlNTnLJym
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{6DF42747-A429-11EE-8024-DE9D3A49EF0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4464 iexplore.exe 4464 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4464 wrote to memory of 1568 4464 iexplore.exe 90 PID 4464 wrote to memory of 1568 4464 iexplore.exe 90 PID 4464 wrote to memory of 1568 4464 iexplore.exe 90
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03260e9a1a606376a86565684882736a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4464 CREDAT:17410 /prefetch:22⤵PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c6bdda3f990d9f4af799c6780b8859b4
SHA1a621164f6b814af5e867c84e7b014695c850fc7e
SHA256bf1d3d4bd2bfaf7e1c3ecda4669a16a68da4c2780c49c60b09d3fbc13a1633dc
SHA512955019d37611587f11831068a20a8b7f2a51838d6c11d02c822aa752fc056ba1336ce2d8f1e7d338fee9b3c9b11889ab8c615a1f60183f27cb060b3976033443