Analysis
-
max time kernel
16s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
2b4c33ea6e7c65d3a125af6eb0115b33.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2b4c33ea6e7c65d3a125af6eb0115b33.html
Resource
win10v2004-20231215-en
General
-
Target
2b4c33ea6e7c65d3a125af6eb0115b33.html
-
Size
39KB
-
MD5
2b4c33ea6e7c65d3a125af6eb0115b33
-
SHA1
522e21a40131dbc17cc371e6526599f251e33d34
-
SHA256
e729198bb870938cc9d0e03b83aa364b2119c0516b253431be49c0211c1a26be
-
SHA512
03d6dc5ff51b535ee60816cc64bbdb8a070a3889fbb17aab3ba8acf9fe7b03150f5a6cbd545060c960864334c581dac6084560dfcc79b53ca92a547b81d96145
-
SSDEEP
768:Zcd9QZBC7mOdMcxpC5I9nC4anE8aUxmcwBwowuU5JPd:gQZBCCOdB0IxCpnE8aPcwBwowt5JPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{671AA946-A3DE-11EE-8184-72AC86130FB1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5112 iexplore.exe 5112 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5112 wrote to memory of 2244 5112 iexplore.exe 18 PID 5112 wrote to memory of 2244 5112 iexplore.exe 18 PID 5112 wrote to memory of 2244 5112 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b4c33ea6e7c65d3a125af6eb0115b33.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5112 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
1KB
MD57370e04d5a9b97debc6c70053b78f0af
SHA12b912fd95a1b3fb3b7fdf1c9b331e6864d357178
SHA25658554dafccb4fa871005ad55cc0d99e98317d31d88b70be810618d417ec34eea
SHA5129e6f316b7f9b08ee515ba9c33333e6f0c4deacd5047ea48914e78b765992099dfe2533573ce51e9db01115fcbd4ae992bccf9fa8fcd3fb8c5f1c59ac2b74db0b
-
Filesize
2KB
MD5cb546f0ce2ca2505cbc9088d8a4592e5
SHA1d87b70b1a34f4313d085de80da3aa4e8845af904
SHA2560c3851f8f6d7b9dc63645a68b0db991edc9162620b9d757684a4a20206c458fb
SHA512b6fcd078f43082daf299a49646280ac3a30b91d10dcfaf8e9fb9e8317af417e34d45ae7397af9507d4101b7bcc58169c2f64adcaa253fc08204b98020b20b551
-
Filesize
650B
MD5ea5a5798612df63ab0532174aaf62634
SHA10f4713eef39ab07510d3703ef201885475ef0b42
SHA256ee44a690e6d7ba27656d9a013b7803d69461a19444d834c918d16c1c56598a31
SHA5128cfd3dc5eb7f2ab4f27abf80bea6955a00112b84ba074cfb8a1bce0207c36f6f12e2f3e90b8ebb8fedd56a5520a4a0d09397af9e6f4885addd890df7bf3b8907
-
Filesize
42KB
MD5e57c81f3a17073a78a7c3c865f74f89a
SHA1587d7c955432f1e5a87460ecbf9086ae2589346f
SHA256e36f1f796e538f826beb42510edc0354133c61c7f711b827def7f91d3f7c8bda
SHA512630aa9dba2aee1125103954b093af8b24907d98761e1a9b93fb6f6c43abfec3afdf53825e3f12fc3cf87fa14855daadfdbc90b1e49b503fb2917599dd77daf52
-
Filesize
157KB
MD5974e99603bd2b7af0ce92c837e909b6a
SHA148be6078cefb7af2f1e94e2e7ff7bb5616c5ed19
SHA256e30b486bfb2c744754179f2a9567d92c57703553ee509385ce127a6dd4dcee0b
SHA5122cf45adf9b18b8583d6cf85f7c7e38ffdcffa7ac667784d39340c0872d681497f526da94ca927069707ea45d641c2c94e17ce1259ad84d6be5a402a66c9ca14b
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee