Analysis
-
max time kernel
0s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 16:56
Static task
static1
Behavioral task
behavioral1
Sample
2ee2d861e5ff93a940b94420502f0807.html
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ee2d861e5ff93a940b94420502f0807.html
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
2ee2d861e5ff93a940b94420502f0807.html
-
Size
11KB
-
MD5
2ee2d861e5ff93a940b94420502f0807
-
SHA1
df600f47b5514ee05420450e606ca538274983ae
-
SHA256
e6ba4b232935001ec01e7edf129fb57f18d6a21f2057d52d6073a9f4501edb67
-
SHA512
06b436929b1f54412cc75a4a84ee43de3dd5fac5b79016ec5b5edc40e42ccf50a0007214d9e6a36fe96074223b15ae2f6cf3af06456f444da82698e12a315325
-
SSDEEP
192:2VkelIsr03ej8k/w1wvqyZB/KnHvDBqB01sLOXuBuLbdU8d:skelIcue1/gcZB/KnHvDBqB0sLOXguLZ
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CB8EBEB3-A3ED-11EE-BD28-D2066D8F1295} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 392 iexplore.exe 392 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 392 wrote to memory of 1572 392 iexplore.exe 17 PID 392 wrote to memory of 1572 392 iexplore.exe 17 PID 392 wrote to memory of 1572 392 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ee2d861e5ff93a940b94420502f0807.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:392 CREDAT:17410 /prefetch:22⤵PID:1572
-