Analysis
-
max time kernel
0s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
f716c16274775cafb0988e85dfa21c53.html
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
f716c16274775cafb0988e85dfa21c53.html
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
f716c16274775cafb0988e85dfa21c53.html
-
Size
9KB
-
MD5
f716c16274775cafb0988e85dfa21c53
-
SHA1
cf172f082b1ac6f0d62e2a1e7f7c72fd5c83996d
-
SHA256
eb0bf32e7048a816cac0dea7241d87545891dc1dac5e6916a3d3c6d2d36954c5
-
SHA512
d3a5f894195190da105bde84917ecf6b7bd25555cd72f88e4e76ecc2a7ee124edaffa103daf88235ab3b6e65b0af3c78ef5128981c3f888dbc2fc4b8db9a70c9
-
SSDEEP
192:spQoKWCQ5aDMXZo40Um9Af2m9GJLOhm9ycdWPm9GYm9LgnJ:sVlnLf2+hjCCc
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F44A516C-AA2D-11EE-BD28-7E4216712C33} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1536 iexplore.exe 1536 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1536 wrote to memory of 112 1536 iexplore.exe 16 PID 1536 wrote to memory of 112 1536 iexplore.exe 16 PID 1536 wrote to memory of 112 1536 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f716c16274775cafb0988e85dfa21c53.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:17410 /prefetch:22⤵PID:112
-