Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 13:34
Static task
static1
Behavioral task
behavioral1
Sample
221f32fcf83aae4227a16efa6119ccf1.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
221f32fcf83aae4227a16efa6119ccf1.html
Resource
win10v2004-20231222-en
General
-
Target
221f32fcf83aae4227a16efa6119ccf1.html
-
Size
95KB
-
MD5
221f32fcf83aae4227a16efa6119ccf1
-
SHA1
15c3f5dc2877c5bc0f0ca82e5e87d2ad57997c85
-
SHA256
45df3b596d6c3d8bb3ca57b4c2bb43f9bfa6178b855cba9c84228d883ed82cde
-
SHA512
1dfacc68bd1d5d93f8d5554a1f49585963bbf30a13619eb1c86e5483c5df31ca54a92231d8c5c4eef3d53619fb4774b56832726a12b33049bf65648e8cb1117b
-
SSDEEP
1536:OHv7EBauXyb6iC4a4/frkaE7z2fTB9rCX7Ce2AisOalNI9:OHTu9+a4nwR7z+l9rCX7CeKsOalNI9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{42F7EF1D-A572-11EE-A0B6-5A131972A918} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1636 iexplore.exe 1636 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1636 wrote to memory of 4932 1636 iexplore.exe 18 PID 1636 wrote to memory of 4932 1636 iexplore.exe 18 PID 1636 wrote to memory of 4932 1636 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\221f32fcf83aae4227a16efa6119ccf1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:17410 /prefetch:22⤵PID:4932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize338B
MD5308f79b83510a6d7623d5596c4d5cf25
SHA1aa8b6467d87889b9167e5d35a05e1124f48ec6e7
SHA2563b094a8c19fc70c9f4e63cd241a6cc132224f4654f026c01f1218f188c99dfe2
SHA5123d209a2ae2d4fc2e6fc33fda1aca177e6989845223a620db672c68cf72fa7d8b9991125e63c20905643d6c896285536d1fdc0f34b34d7bf353c02742e303f187
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
130KB
MD5d64329abde04fc4a91990afc4c5467ef
SHA1f588b18218a29287557e09bc152695ee04a972dc
SHA2561f4275c1db06065cb93bf0b1fa8dd46ca5c90d55dfa8c753bf0ce91c37ff05a6
SHA512a212240d5d05b9a574868cd8aaa9db60d295c46e22b641f7799c95d23f0b45566367672b204f166a3e960367a2463f8c451faaa8cc6f84f2c4c783c772cca6d8
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\platform_gapi.iframes.style.common[1].js
Filesize44KB
MD5bf7f14c2fc9211c69ab548f6042fdedc
SHA1d171339cc0f0cb18c1fa6126c621c2b5a5b9ab05
SHA256df25f2f35e3b30512437ea67ff2ae7edfd5b31cbb542681abee1ce7b6bd0a83f
SHA51234815a74880666862ecc3910518681c733f868eef56604036062cc5529821f6618f7fc312fa118ddd03fab38e292eff1f5993b88dc5a98ce1b97c41a471a9c9c