Analysis
-
max time kernel
0s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
08514c152801f19ed576c0df35422496.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
08514c152801f19ed576c0df35422496.html
Resource
win10v2004-20231222-en
General
-
Target
08514c152801f19ed576c0df35422496.html
-
Size
11KB
-
MD5
08514c152801f19ed576c0df35422496
-
SHA1
1b6fd911f8dedb1b4de790b30c81b55f22bd4295
-
SHA256
e3995c69f96b9938bd9f5e636ea78ec695bab04babe0f1c27beabbd2a53bab3a
-
SHA512
83d8ec6b6cb7dd2610e57e5e9c8c8fbe325473546c0f54f8b6a4aec329437704637347329dbe28539da78d53c3d10f797d4fcd25f606495692e5c64e6af4d6f2
-
SSDEEP
192:6eeHiUvVuZzgetJNoRwXV465CjBKWjqYFO0jINklTaeeNC3QRzTYKMraXS5CY4SC:8ZvVuZzvoRwC65Y/jqY00jINklTaeOCK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1C10CCF4-A6FB-11EE-A0B6-FE6B1C63FCC4} = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 428 iexplore.exe 428 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 428 wrote to memory of 3612 428 iexplore.exe 16 PID 428 wrote to memory of 3612 428 iexplore.exe 16 PID 428 wrote to memory of 3612 428 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08514c152801f19ed576c0df35422496.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:428 CREDAT:17410 /prefetch:22⤵PID:3612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
24KB
MD53c9eb74665e3af1b71206035af977f73
SHA16b4ac112c29a520a9586e71f50963190a575d595
SHA256787198549711e344dcf97b354d89fc803e26fa4fb0cdd8392eefa576c86ce7df
SHA5122a9bbfe32f61526c08abbd98dffe0aba24ffc109f0ec6db1f23b9a5d83f741d034cbef73a1d6366cae34644f0fc9c9b4a8f64adce80a1fd858a1b34b540b256a
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee