Analysis
-
max time kernel
0s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 02:36
Static task
static1
Behavioral task
behavioral1
Sample
4d0f837dc307706f8f288b7cc02daa0f.html
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4d0f837dc307706f8f288b7cc02daa0f.html
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
4d0f837dc307706f8f288b7cc02daa0f.html
-
Size
22KB
-
MD5
4d0f837dc307706f8f288b7cc02daa0f
-
SHA1
a9b5c34daf713c073c542205fd8de88f3625c643
-
SHA256
038b18aed0ca8f994b797e1e7d170753e4815861d3756830cb0fdf468f65f3c7
-
SHA512
cc636e90211054c0392cc82f71f4af38f6fb4ff30738f839700b5d443a3c5f7d0eb396012c5e62df41cbd1f1a17dba345a96cbc24277359ebfc10ec45cb4ed67
-
SSDEEP
384:QvRl1JZ+n9zbA7BREl2+v1P1kDlTy0gbAx57heyOTrSSCqdhFOxgzd:QvRn7BRGlv1cmcx57hsJCMJ
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{8551A547-A972-11EE-8184-F68B0B0A1028} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1060 iexplore.exe 1060 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2612 1060 iexplore.exe 18 PID 1060 wrote to memory of 2612 1060 iexplore.exe 18 PID 1060 wrote to memory of 2612 1060 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d0f837dc307706f8f288b7cc02daa0f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1060 CREDAT:17410 /prefetch:22⤵PID:2612
-