Analysis
-
max time kernel
0s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 13:46
Static task
static1
Behavioral task
behavioral1
Sample
22e7e0422f5417e879384396f7b5a4db.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22e7e0422f5417e879384396f7b5a4db.html
Resource
win10v2004-20231222-en
General
-
Target
22e7e0422f5417e879384396f7b5a4db.html
-
Size
3.5MB
-
MD5
22e7e0422f5417e879384396f7b5a4db
-
SHA1
ce6458d80784d44ecfafa100bdef3ddc954c7b4d
-
SHA256
93f0adeece77bbbe6da0d34213e9dd45e8ecc39dd3a090114d3b8015027ee5c2
-
SHA512
7ee590b3d34ba603d18e400838926bb7340d687f7e09e96a873319c5c7906dd1c2c9e8062c96685c4ce02841f2d82a8e5ca6739fc3e8142fa2821f5b0919d918
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Na+:jvpjte4tT6w+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{DE86E7D0-A578-11EE-A0B6-62C42074CD15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 428 iexplore.exe 428 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 428 wrote to memory of 2280 428 iexplore.exe 17 PID 428 wrote to memory of 2280 428 iexplore.exe 17 PID 428 wrote to memory of 2280 428 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\22e7e0422f5417e879384396f7b5a4db.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:428 CREDAT:17410 /prefetch:22⤵PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
13KB
MD5ab91e8f9ba34246f7059d3da92b9471d
SHA131ebed4ec9bc20ecbd746ca95e2ebf4b9a8e45f1
SHA2563912435d0525c7ca0f61bf6ca7d9ba9e836ce4b7109fee65a477101c7377ca33
SHA512465586e544e890a3ca7d128be31878e389057ccb3fee95ad36cf8c0f8be6bfeb655fe9dfe302d8316c65e67477c3106a3f49d43f271c047c3cde2ed066baf222
-
Filesize
1KB
MD5c6bdda3f990d9f4af799c6780b8859b4
SHA1a621164f6b814af5e867c84e7b014695c850fc7e
SHA256bf1d3d4bd2bfaf7e1c3ecda4669a16a68da4c2780c49c60b09d3fbc13a1633dc
SHA512955019d37611587f11831068a20a8b7f2a51838d6c11d02c822aa752fc056ba1336ce2d8f1e7d338fee9b3c9b11889ab8c615a1f60183f27cb060b3976033443
-
Filesize
1KB
MD57c62ecfd5401ab16c0267dfc4ec0c20e
SHA10b6178fdc794500f8f92a282cdef59ce18fc50bc
SHA25667e0c54b1a0e769aa3b99a373d00206b7596623535d6405d7352776081574e00
SHA512c5b76c2c6483895743018da598e8673ca7c3954704e57c1ce2f2a75ff100902239a297bc13d49d3135e22535441aa7b4161472b81cb1aa263eb45ee782fc0f49