Analysis
-
max time kernel
6s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
6d4edde90fd52d41292b63773f0d66e0.html
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6d4edde90fd52d41292b63773f0d66e0.html
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
6d4edde90fd52d41292b63773f0d66e0.html
-
Size
74KB
-
MD5
6d4edde90fd52d41292b63773f0d66e0
-
SHA1
4a4646573e80a3dd5c806dafd319b4e43ad54774
-
SHA256
6293aa2bee4a698ac0ab2aa937f3f9c2f483b257b01a4539de870f37f8e96d3e
-
SHA512
3eace93e23368f6f2565e254cf2313ff28156963105e854da412d463315a93890d0c57ed5aed577b041dd3159d3f333345559872486aaea3e3140fce3cff8fa6
-
SSDEEP
768:JkcluTMo8nkJPPtaWXcyGSjcKFu+C+sEWkCMG6UDunM0jzRlI2SSr:JkclJ9nkJtaWXc+0fpEWTMG69XRlL
Score
1/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{678FDFD2-A4FE-11EE-BCD9-4EA1437444E8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1096 2420 iexplore.exe 87 PID 2420 wrote to memory of 1096 2420 iexplore.exe 87 PID 2420 wrote to memory of 1096 2420 iexplore.exe 87
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d4edde90fd52d41292b63773f0d66e0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:17410 /prefetch:22⤵PID:1096
-