Analysis
-
max time kernel
0s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
66548af5f0a7aa22bcb7dc9ab4cd20c0.html
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
66548af5f0a7aa22bcb7dc9ab4cd20c0.html
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
66548af5f0a7aa22bcb7dc9ab4cd20c0.html
-
Size
118KB
-
MD5
66548af5f0a7aa22bcb7dc9ab4cd20c0
-
SHA1
8d14d7d0fa98496cde800d1c842b81d8b850952f
-
SHA256
b8d097346948159c5399f6197990d7b935c4db8523a3100f545064d506a1fa1b
-
SHA512
938e0f7df060e4a59ff76dc6be43764af7b6bc89fc4ccf978e8117c7cedae1366fcb88c0deba6c9b451ebec7e5293b5e0bae6bd6d69d4d84d595a27147f64539
-
SSDEEP
768:7ok27iKKLprmGN1k3mayMyVzv61/rAzhbDjYh32K1CK7d2bIjozXEpWKr/oqNsmD:08VhHbU
Score
1/10
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9C5B5C32-A4DD-11EE-9963-DE9D3A49EF0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3784 iexplore.exe 3784 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3784 wrote to memory of 436 3784 iexplore.exe 17 PID 3784 wrote to memory of 436 3784 iexplore.exe 17 PID 3784 wrote to memory of 436 3784 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\66548af5f0a7aa22bcb7dc9ab4cd20c0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3784 CREDAT:17410 /prefetch:22⤵PID:436
-