Analysis
-
max time kernel
0s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
5f82f1bfcff291c432598d629ad1754d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5f82f1bfcff291c432598d629ad1754d.html
Resource
win10v2004-20231215-en
General
-
Target
5f82f1bfcff291c432598d629ad1754d.html
-
Size
19KB
-
MD5
5f82f1bfcff291c432598d629ad1754d
-
SHA1
e4bcc06977fe1aae7a25b4a08d76a84e7b58491c
-
SHA256
b6b4f206db36dcb74c5a30ed0278d70690fea471274ee4cc8cdc59a82dcb63ab
-
SHA512
e64cdfb3407718c846db8925c93aad295d09428ddf526f16610d1e4df4440c605a98308709fd6370a2e9e35cec51e42253ce054c8d1076b8509df5880fd67f9b
-
SSDEEP
384:SIyTyn6SM9PbAd0Z0BgFWVl4JVtIgohLUuS:Sq6R9PbAd0Z0BgFmiJVugohLUuS
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{488BEB02-A4BE-11EE-BD28-72AE6231743A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3176 iexplore.exe 3176 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3176 wrote to memory of 3872 3176 iexplore.exe 16 PID 3176 wrote to memory of 3872 3176 iexplore.exe 16 PID 3176 wrote to memory of 3872 3176 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f82f1bfcff291c432598d629ad1754d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3176 CREDAT:17410 /prefetch:22⤵PID:3872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
743B
MD5a812427b092f1577c6bc40b7c073c650
SHA19992173b8231fd2991763485d1aafed70ac3325a
SHA2569897e1c1dc3e0488f66551ceaf5210c632f65e5c70e12127a699c031a0470ba6
SHA5129af81f0d6c01771d2d06dd71f8c752440b4503fae9e334b59a26bdcfd80a23a896d9a7bd60b833011d0c9d40636e3350f314865347e7775cf6cf21f7dcb94073