Analysis
-
max time kernel
0s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
58f09a364909f996a89d7dca1fa812d2.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
58f09a364909f996a89d7dca1fa812d2.html
Resource
win10v2004-20231215-en
General
-
Target
58f09a364909f996a89d7dca1fa812d2.html
-
Size
47KB
-
MD5
58f09a364909f996a89d7dca1fa812d2
-
SHA1
b975389e1110aef53fd3340925e0907a743fd57c
-
SHA256
2428641eca80fbb4924aba745effd89255c5defe22b14bdbe28f89a1baf9a4bf
-
SHA512
41bd673941c16be632a586bf99893a8ecf59d33a60c7db46e5cfcd07f72ae60a3fffd3f7155e0f8970b265013bcc11c312cac09c4c7a3b5efa63dcae6b73ccd4
-
SSDEEP
768:qEijZeqLJwEijZeqLoQdFi3AK2LZFKqSauJPXVROrZwA22KZK9KlljdwtU:qEijZeqL2EijZeqLds3AdrKqSacXhK9a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{97C2A465-A4A0-11EE-9ECD-F21AB124C203} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3668 iexplore.exe 3668 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3668 wrote to memory of 4956 3668 iexplore.exe 16 PID 3668 wrote to memory of 4956 3668 iexplore.exe 16 PID 3668 wrote to memory of 4956 3668 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\58f09a364909f996a89d7dca1fa812d2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3668 CREDAT:17410 /prefetch:22⤵PID:4956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db