Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
0c7fa3cf0a9c7858332687b7609ac7e0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c7fa3cf0a9c7858332687b7609ac7e0.html
Resource
win10v2004-20231215-en
General
-
Target
0c7fa3cf0a9c7858332687b7609ac7e0.html
-
Size
57KB
-
MD5
0c7fa3cf0a9c7858332687b7609ac7e0
-
SHA1
fa50d26471184e08f38f7143ee7dcd72711eeb41
-
SHA256
e61b2c154f11bb6413c38c5ca42489006b3040e7e2a0e57193ec3d11b78585dd
-
SHA512
6757e3761ad7cf632ab087025ec1ad778e6765a20a19b602c0027d52fd3abf95011a3b456ea3d84f6b5757ec6a498e3dfaba178b4a682627cd22eb942aa4a177
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVroxawpDK2RVy:ijnOPHdsR2vgyHJutDK2RVroxawpDK2m
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B7EBC636-A352-11EE-8184-4E55496B34AD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2896 2292 iexplore.exe 16 PID 2292 wrote to memory of 2896 2292 iexplore.exe 16 PID 2292 wrote to memory of 2896 2292 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c7fa3cf0a9c7858332687b7609ac7e0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:17410 /prefetch:22⤵PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
34KB
MD594baeae5a431d3f4b6a82c4a91f59511
SHA142afc199c30c4adf7d69bb10cc1b7674102cad6e
SHA256df5d165b5af8ba63c3b606253a8c73dbdc132bc66153c867b4acbe47efa55f0b
SHA512866c5064e7a88ff99696a64ef6cb3a770db74ae99d773754613422f6fc4d850eb32945d57aabcd0cbdbb9bec74ab2627a7d7a0cd14bd465086db0083756f0017