Overview
overview
3Static
static
3�...��.htm
windows7-x64
1�...��.htm
windows10-2004-x64
1�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1�...��.exe
windows7-x64
3�...��.exe
windows10-2004-x64
3Analysis
-
max time kernel
0s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 23:14
Static task
static1
Behavioral task
behavioral1
Sample
ע/77169.org˵.htm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ע/77169.org˵.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
ע/ĺڿͬ˽ѧѵ.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ע/ĺڿͬ˽ѧѵ.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ע/ĺڿͬ.url
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
ע/ĺڿͬ.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
ע/¿ƼIDC˾.url
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
ע/¿ƼIDC˾.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
ע/¿Ƽȫά.url
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
ע/¿Ƽȫά.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
ע/̳.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
ע/̳.exe
Resource
win10v2004-20231222-en
General
-
Target
ע/77169.org˵.htm
-
Size
4KB
-
MD5
e3917c7f4410faf63e3bdcfff5c33e81
-
SHA1
6848c2917ccc5e24578105ab31dcb23e451bcb10
-
SHA256
a05f31f26ce57b9e2d9bb6b242731186374c2a0b11d1723af7e107f2dac51ba8
-
SHA512
8b4fc3b9faa01722e49064f1f027f91860d0c7e6c8bffdcfe4465d6860857f0513784301902a10704684b8b706e9deddf0d39ad53db3f17ae09fee63eae7109f
-
SSDEEP
96:m1OQF/fRA2RWhwM6wIm4yRgJ/Snq6kVUVTWn0M9tJexGTHwG6ak:mXF/JA0Vde4JJ4jW0MH4xG0G6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{92ECFBB5-AF40-11EE-AA35-6E02734BA6FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4760 iexplore.exe 4760 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4760 wrote to memory of 2184 4760 iexplore.exe 16 PID 4760 wrote to memory of 2184 4760 iexplore.exe 16 PID 4760 wrote to memory of 2184 4760 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ע\77169.org˵.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4760 CREDAT:17410 /prefetch:22⤵PID:2184
-