Analysis
-
max time kernel
0s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 08:27
Static task
static1
Behavioral task
behavioral1
Sample
11f2554f56796ae09f45f3638e428319.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11f2554f56796ae09f45f3638e428319.html
Resource
win10v2004-20231222-en
General
-
Target
11f2554f56796ae09f45f3638e428319.html
-
Size
3.5MB
-
MD5
11f2554f56796ae09f45f3638e428319
-
SHA1
e26cc7e5117acdbf594a59086003e8b3e4c5cafc
-
SHA256
6c02eb9f605bc04f860704166ec526298c1a2d408b70ec30d034988d0cf7af8e
-
SHA512
27efea1f6d04135359a527f641a50c467cbacfe0ae314de21a5098b7bff121b55376d1f56f461fe2592c07a87307976ab4bd9c5200fb10bf8f99e78595752d52
-
SSDEEP
12288:jLZhBE6ffVfitmg11tmg1P16bf7axluxOT6NAG:jvQjte4tT62G
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{AFDE917A-A36D-11EE-A0B6-E2FF52840C3F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1104 iexplore.exe 1104 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1104 wrote to memory of 4924 1104 iexplore.exe 16 PID 1104 wrote to memory of 4924 1104 iexplore.exe 16 PID 1104 wrote to memory of 4924 1104 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11f2554f56796ae09f45f3638e428319.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:17410 /prefetch:22⤵PID:4924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
5KB
MD5c200aba7240c351a23a1d7d53c4ae303
SHA1ae829f3c38b3886429730018ce5695ced5a67b39
SHA256e90cb723124aea49967b5709c204fd6e6e4cee855b49c05a7c26ae055e739c08
SHA512f5df3b3c9b6fc9245408499646c90e87761a1ff9d1a48496ed4e2f0bc3984c88d140595a83371aa4a85b7945eae4dd16966225e1ea0cf8e1fca0b5eacb112eb5
-
Filesize
5KB
MD57bca1b1e011eb303e14b20203ea7f36e
SHA10cde285bf1d49d4e8b2398c1e1002a065dea3191
SHA2566d9bab282c1afddbe4eafe439f9717604c02f3e6a0820defcef196d9c191fcf8
SHA51225f568339609bbac4ba60562bdf48034fa787e8b084ffa4a6b58a036d8158b9d7f83a53dd19b96ff9bcfc4b2106c6e43feed76845e91227047426df55afb435a