Analysis
-
max time kernel
0s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 06:02
Static task
static1
Behavioral task
behavioral1
Sample
5871646def342e1a7759b59ad3be07d5.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5871646def342e1a7759b59ad3be07d5.html
Resource
win10v2004-20231222-en
General
-
Target
5871646def342e1a7759b59ad3be07d5.html
-
Size
3KB
-
MD5
5871646def342e1a7759b59ad3be07d5
-
SHA1
482b587290969018810828b27bc7ab6a565c316e
-
SHA256
e0819709f957e27cf5a68b006cdfc774a5b72c3bd7b3e421c8fd8f17a064a5fe
-
SHA512
d2bee845e875a6b6236ec39c299a800f7241e6c181e71507d5db2249b5c983cb517fb1f23a5e2f74f0bd08ad73c6646a9f0ff3dd479803bfa4946b0020d114a7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{ADCA37C0-AC29-11EE-A0B6-E2269387CB8A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1856 iexplore.exe 1856 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2532 1856 iexplore.exe 16 PID 1856 wrote to memory of 2532 1856 iexplore.exe 16 PID 1856 wrote to memory of 2532 1856 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5871646def342e1a7759b59ad3be07d5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:17410 /prefetch:22⤵PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5790e2ccfebd61a71d8a61ef04c53e344
SHA1f527b3d84a02fcc664578bcf69f1150fc7e681a4
SHA2560d0258ccf13fdfd6bda7c03848174bbd4ccedd6acff940e101650e81241cbeaa
SHA5122bd782ec0ea48e49ecf44b52cbde148c6e609a0302f1ecf106852d26beefe388578a4b8f32ff239038dcc3207ff5a81c37fc33997fb936cd0f7a01082415c60d