Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
61d18ad022d66f353c4cbd43e9e6902f.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
61d18ad022d66f353c4cbd43e9e6902f.html
Resource
win10v2004-20231222-en
General
-
Target
61d18ad022d66f353c4cbd43e9e6902f.html
-
Size
61KB
-
MD5
61d18ad022d66f353c4cbd43e9e6902f
-
SHA1
2e061234dd2afbba15f7354e1af15de6340f65c5
-
SHA256
3809b107ed1737994a85b6c43822f57f521449a23b2c5b4292cf6134cfb397ed
-
SHA512
2fe3e3c5647372282a0652533214b236caf15a45e5a5285f918157364b4578ec0745828073a30f5b59c244017c7cac753893281811040d5e459e6b5e1641e2b0
-
SSDEEP
1536:+9VDewI3IDMGi4KpW0VrQMPBEhImFrO7rErJrQTr7AruRfrAOrCVrCdrIJrK2rZV:KewI3IDPi4KpWtMPBEhImYd1yr0aQVQV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BAC9B56C-A4C9-11EE-A0B6-6207E08AD8FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4124 iexplore.exe 4124 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3180 4124 iexplore.exe 16 PID 4124 wrote to memory of 3180 4124 iexplore.exe 16 PID 4124 wrote to memory of 3180 4124 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61d18ad022d66f353c4cbd43e9e6902f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4124 CREDAT:17410 /prefetch:22⤵PID:3180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
173B
MD57a5df79fbaaff2c161c6e29461785403
SHA189b90dfb141e4b0f97d15feb34a49f9eec64dc52
SHA256b1c52a7c21c4b21bf69866d7859284068d6ecc90306fe22076f81daa0176a7ed
SHA51219f00a755f34e3770f1dd0ab698056bf60e802ee7e941662054cf61565a8c06639c3aafe1e93b0bbf446d9f7d08f5e827648311703e8718252597b78734960a5