Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
2cce54f78b9de9d57599d234cef0fb46.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cce54f78b9de9d57599d234cef0fb46.html
Resource
win10v2004-20231222-en
General
-
Target
2cce54f78b9de9d57599d234cef0fb46.html
-
Size
122KB
-
MD5
2cce54f78b9de9d57599d234cef0fb46
-
SHA1
dc5847cf0aa69ff1833c60d8d4cfec092a24cecc
-
SHA256
dcc54e484c4f9eb76f7ff4a9046df602ebe672768f44d2a40624395c4480851e
-
SHA512
67d40e4e1af0737d9751f60d07a58089dfdf55943c90273504ce0e2f283f4e4149f82b8aa210ca5e151d08a49ffb09bd9ca5aaa0387ad9e82179ea2f3e994b56
-
SSDEEP
1536:kaSYN+IpK1ttU4BSPtPgP8rSHakkmO/82KvDKyfVEZdAyfrB+Bi/40MLv1D6lf39:kaSYhjSURhUzbbIh1/rWHk/+aGFYr/d
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{575419F1-A3E5-11EE-A0B6-5E75A0F0D9D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1124 iexplore.exe 1124 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1124 wrote to memory of 376 1124 iexplore.exe 17 PID 1124 wrote to memory of 376 1124 iexplore.exe 17 PID 1124 wrote to memory of 376 1124 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2cce54f78b9de9d57599d234cef0fb46.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1124 CREDAT:17410 /prefetch:22⤵PID:376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
Filesize
5KB
MD53969b3d3910063b2ea89e78caf54ddd2
SHA19a2c35ea3e0a47d88b860a24308cdc2cf23af8d5
SHA25605b990508145c40f5e7238b0696a0e15bda306f901d985f38ea0dd550b7e2fbc
SHA512c37a1e55c019516cbcf79658fc12a61fbb1b8c6ea094775bbf06522a88ddaafdc8c3e503d837c223d2a530fbb939607d443c652668e66e0b84307a267b0b9547