Analysis
-
max time kernel
1s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 07:58
Static task
static1
Behavioral task
behavioral1
Sample
5df0492cb4c45009bdaff09995891555.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5df0492cb4c45009bdaff09995891555.html
Resource
win10v2004-20231215-en
General
-
Target
5df0492cb4c45009bdaff09995891555.html
-
Size
16KB
-
MD5
5df0492cb4c45009bdaff09995891555
-
SHA1
11d550a50a456884adb73e2e2db76991ce688b9e
-
SHA256
d9058357a387fc182af6c2f789e89c5e7a41b2b5e47feed67d55e8ea14f1c7be
-
SHA512
01c44a58a2147ac1f3b0b6eed3b0a7c43109b8f72b0c4263b932a9575d57069c534611334b8751a7ee645577b4024411b5aa6501e83d8f87691703a680579efa
-
SSDEEP
192:rSNgoQb3MHOFNwcj+fSiABpfeVFjpfv/Wio7ZiHFS9EO+5UrAt4ZMtmPf3P47:rS3HkewpfeVrgtsFS9jAt4etN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C9A4F272-AC50-11EE-BD28-FAD2FAC7202F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 784 iexplore.exe 784 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 784 wrote to memory of 4924 784 iexplore.exe 24 PID 784 wrote to memory of 4924 784 iexplore.exe 24 PID 784 wrote to memory of 4924 784 iexplore.exe 24
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5df0492cb4c45009bdaff09995891555.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:784 CREDAT:17410 /prefetch:22⤵PID:4924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD534d5778526a8892dbb48f55f5c14a96a
SHA127f5254b201139da6a5d4a11fab8444621c4e518
SHA2566a5410bb073fb2c87c1c6ba8a417762734f1e5bc44a801950ed1e5aa58786b35
SHA5129566b0cce7cd4d05c87fc5a94192012611e805ac938618cc1fd59a512833457ace5202c9395bc536c78f5d330d852e94aab75f822c22e86ead176d0ad79b1479