Analysis
-
max time kernel
1s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 16:35
Static task
static1
Behavioral task
behavioral1
Sample
7d1d5ada08faaab77ede32f89f10eed3.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7d1d5ada08faaab77ede32f89f10eed3.html
Resource
win10v2004-20231215-en
General
-
Target
7d1d5ada08faaab77ede32f89f10eed3.html
-
Size
25KB
-
MD5
7d1d5ada08faaab77ede32f89f10eed3
-
SHA1
7dc9c95d2cfebfe1e7c8b65bad8d8cf45b7cb9fb
-
SHA256
749c262b8fffbd064b0635e09bae37b1b9c490c0c409d2ea1c55d307fa9f2f81
-
SHA512
d0b9b18f5ef7e0d2cf9dbeaeec67d9a6c00dde5e75803b69501d1ac3eab1a06afb748c6abdf7564e4a1bd1836340a20c70646a4fc82d0b934544d1a57050a0d2
-
SSDEEP
768:x8fl+PoTQ5hwHSI4xx4TD+UAm38y2g9UDpwws+B8IFdUcm:x8fl+PoTQ5hwHSI4xx4TD+UAm38O9UDu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D1CA78B2-ACD1-11EE-BD28-EA184F49D407} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5244 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5244 iexplore.exe 5244 iexplore.exe 5304 IEXPLORE.EXE 5304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5244 wrote to memory of 5304 5244 iexplore.exe 16 PID 5244 wrote to memory of 5304 5244 iexplore.exe 16 PID 5244 wrote to memory of 5304 5244 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d1d5ada08faaab77ede32f89f10eed3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5244 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD587914a367b0cb15f692ceb4319dde894
SHA1adc790c4de6965fe374884cd49a69e728500c17a
SHA256d35f89cebda44daa2f2060cdf205b1f1180817a4dd2431838677ce33c6a232fe
SHA5126bfb724bfc0428863a30c6fe85ab7edcdf06443ebd75a970b3744e58468c7f1bf679cebd4c1dca3f9319456d0b3e947e0c019ee1fd420a1126edb47fc2833932