Analysis
-
max time kernel
0s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 06:28
Static task
static1
Behavioral task
behavioral1
Sample
0ba208ff2ac20e3c619a0790dc905337.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ba208ff2ac20e3c619a0790dc905337.html
Resource
win10v2004-20231222-en
General
-
Target
0ba208ff2ac20e3c619a0790dc905337.html
-
Size
10KB
-
MD5
0ba208ff2ac20e3c619a0790dc905337
-
SHA1
755957a5e6a7570cc20bbf07cc08a50dc9dbeb9d
-
SHA256
cf832f9d5346f448cc094fa3089ada2a22ced2c6942b05779d9acdda0b348ed3
-
SHA512
81609482c4c2ef39bf87be66423d0b7e07da5f18f1993268772021f182019f6a649651c72933838458caa6f909492136e3bc3c596396ff5978d924b53e8f94c2
-
SSDEEP
192:SyS6Vw1x5Ou4qk0N5k4QXVROalaZC4siQx2QMRQrDQGVQi8QgHh0QHPQzEiuQC8h:SyS6Vw1x5Ou4qk0PPmwNC4B62dRgDFVn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9A0E85B6-A34E-11EE-A0B6-C62A3EC50C5F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3988 iexplore.exe 3988 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3988 wrote to memory of 3364 3988 iexplore.exe 17 PID 3988 wrote to memory of 3364 3988 iexplore.exe 17 PID 3988 wrote to memory of 3364 3988 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ba208ff2ac20e3c619a0790dc905337.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3988 CREDAT:17410 /prefetch:22⤵PID:3364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5dbc7e11f25f70c381ff557e7cced52a7
SHA13bfa52c64f380bc63e034d99402fc496e56d4aa2
SHA256609e3015cf9bb80fa671e7387124edb894757336fc7ba9d6f263f91ea0a911ce
SHA512e702a6144112bd44b6617318295ba2c83c39fc3db385b81135613aef89252871e0c2b7b5e21ce0a7cbad6048c31301c4abebecb3b827855dc1e486c9b12b0512