Analysis
-
max time kernel
0s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 02:28
Static task
static1
Behavioral task
behavioral1
Sample
0ba96ad851019a48f4a74163a36aa705.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ba96ad851019a48f4a74163a36aa705.html
Resource
win10v2004-20231222-en
General
-
Target
0ba96ad851019a48f4a74163a36aa705.html
-
Size
755KB
-
MD5
0ba96ad851019a48f4a74163a36aa705
-
SHA1
63641abdc722f80fb1e90c2860c01adf1af27f63
-
SHA256
72fbc76940dbe88427e0bce1d4f81ac371d0babc34c7273004e2d2082e2a8b64
-
SHA512
7a44f248c21f4ebdcabc0e4b7e73c0b9dae155103030acdfba048a1e88c0894fae2b1949c61dca44364944212c0b389f877534a31ad293877e1c5e6040f70fc4
-
SSDEEP
12288:N94j+xXEDjXHYDzEPcEXoqNwdeF4GTjXHYDzEPcEXoqNwdeF4+O6NmC+F:HDmXouF41DmXouF4+OJF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{ED8AEF8D-A7C2-11EE-A0B6-DA96C499C6F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4340 iexplore.exe 4340 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4340 wrote to memory of 3772 4340 iexplore.exe 18 PID 4340 wrote to memory of 3772 4340 iexplore.exe 18 PID 4340 wrote to memory of 3772 4340 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ba96ad851019a48f4a74163a36aa705.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4340 CREDAT:17410 /prefetch:22⤵PID:3772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD56eed2d504c5c297e7eab521509b65ab9
SHA1bf6986926193920da2ffc5e9b6f87b5b68e959fd
SHA256f302d17f5177f5e0f95988efe685b25a07e95687dab4d88a960ee97d40b60cce
SHA512d40ff3325d19431daf25603779fc340f5cbb5b3d3ab060a85fd68f464f4a306566cfc58939a2825ca1587a0cbb6d37b7d41f60da84e457056c6fe950656282fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\478691279-postmessagerelay[1].js
Filesize12KB
MD592169c8a0fbf6e404267d0705cdbdf42
SHA1a5cd88b74ca5ced239cdbfb458fe25540d671f46
SHA256dba668b49a111527aac8f616b9053ea57c944e01a84ebdcd02a13da921223384
SHA5128c5d35ea512fa7be367cd9a9ded2f23822dcce730e5502a355ed0d48949ef763eab13be0d50a66de6b0f8419d6a002c12c4ddbf20d97f5393ba922e48a4f02e2
-
Filesize
3KB
MD52388892257f13942a6d0b8d2def6755d
SHA1a2ad9d23ee57d4bb9af7ba246ce23e77434993f4
SHA25626833b6b88dc934750055102777efe0510bf46098b6a4afe199a2328f41ee266
SHA512e77fc6e86bdb6789f5a2fa16dd967e11131195f06d87c9dbf964f5ff196d532161fa276e54be86118049533353c133ff0c7d20deded341a9699b632de1b34d8e
-
Filesize
133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
Filesize
56KB
MD51944af3661da46249991197817b6cd8b
SHA1f952df40ec79fafc7c798f37aff92878977376ed
SHA25663326a1c4e0eddd3501f0a064b06a2708eb0362f3ae934f53145978d3d0799b5
SHA5120bef19b32be337cfba179ed9ce4533a207cfe645d2e5fe0da9fadc7b01c72704fc89749670d1ac48b8d494675bc62ac089fdc4d8495979226f10828225594376
-
Filesize
17KB
MD5f019fdda31635d2a31b151ad8ad56c7a
SHA16adcbec55f66ffaef83d9a134423aa98eb2a2189
SHA256c7fc0b1526533002c956ebf8e8c42c3ad3f96c41ace73fb4063cc89051944831
SHA512fc278c12316e098976833882a38c788d812f9d36bd1b9b2b8c87dab4dc906af26a860df95436ea1b7d509236d44d0533d475a153437f8f5d42653fc28a77ad64
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee