Analysis
-
max time kernel
1s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 13:18
Static task
static1
Behavioral task
behavioral1
Sample
212dc383d6c2b6860ba4ec916bcc943a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
212dc383d6c2b6860ba4ec916bcc943a.html
Resource
win10v2004-20231215-en
General
-
Target
212dc383d6c2b6860ba4ec916bcc943a.html
-
Size
11KB
-
MD5
212dc383d6c2b6860ba4ec916bcc943a
-
SHA1
f6a8f290f9301c5d19640561a48d41e7bbf0bf33
-
SHA256
e50bebf13d7c733645593eaf7990253965527e4dc97646daf9e86449003b2f51
-
SHA512
bf94e3230f850d500b75edd4fd797ed35130c097ee80d13416740232183aaecfa386b3687f0f3a2b5b2d54b5cf24723ce7042f25b01e54021a994ac048422a53
-
SSDEEP
192:2V4lIsr03zw8k/w1wvqyzB9UngN7YKt018LOXuBuLbdU8d:s4lIcuzQ/gczB9UngN7YKt08LOXguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7BD3DAC8-A569-11EE-9A4E-EA184F49D407} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4228 iexplore.exe 4228 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4228 wrote to memory of 2760 4228 iexplore.exe 21 PID 4228 wrote to memory of 2760 4228 iexplore.exe 21 PID 4228 wrote to memory of 2760 4228 iexplore.exe 21
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\212dc383d6c2b6860ba4ec916bcc943a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4228 CREDAT:17410 /prefetch:22⤵PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5ec0dff208f794c70509e0c2e15d0bbda
SHA1c4aac7fa184dce45e0e554a0e18de1d62c4d06f1
SHA256b973640eb574f77f51c55f8eaf3159d64fb5f00735f082d0153f6264ee777085
SHA512d292b268618b3a5015a18a95cd2214b3520385d89f85ccf92770ee973c4712149675cd00efb87d07df356b63594467c787894679e1e62e3df8320d26b106ddbc
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
1KB
MD5c6bdda3f990d9f4af799c6780b8859b4
SHA1a621164f6b814af5e867c84e7b014695c850fc7e
SHA256bf1d3d4bd2bfaf7e1c3ecda4669a16a68da4c2780c49c60b09d3fbc13a1633dc
SHA512955019d37611587f11831068a20a8b7f2a51838d6c11d02c822aa752fc056ba1336ce2d8f1e7d338fee9b3c9b11889ab8c615a1f60183f27cb060b3976033443