Analysis
-
max time kernel
0s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
f9ed93672b6a507d24dc62ec1606ab18.html
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f9ed93672b6a507d24dc62ec1606ab18.html
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
f9ed93672b6a507d24dc62ec1606ab18.html
-
Size
430B
-
MD5
f9ed93672b6a507d24dc62ec1606ab18
-
SHA1
33b8a0e674e666159c92dc9299d42253f5bde0d8
-
SHA256
d85475297c733103f727aa56268f19ff51f817cad408cc124449c0a73f2ea353
-
SHA512
d710d717fdb66940f8c4ffc09e25adee79ecf9543da381b01f96b87920bcf5b78f6215b7e1fe136c449eb999a3ae11347bbc4a86555de6f0b484a3dada62de72
Score
1/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{0B0072CC-AF32-11EE-AA35-5A2850D44A60} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5036 iexplore.exe 5036 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5036 wrote to memory of 5000 5036 iexplore.exe 18 PID 5036 wrote to memory of 5000 5036 iexplore.exe 18 PID 5036 wrote to memory of 5000 5036 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9ed93672b6a507d24dc62ec1606ab18.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5036 CREDAT:17410 /prefetch:22⤵PID:5000
-