Analysis
-
max time kernel
2s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
10306bcdd84c6d8fdaa3a12055ad1e71.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10306bcdd84c6d8fdaa3a12055ad1e71.html
Resource
win10v2004-20231215-en
General
-
Target
10306bcdd84c6d8fdaa3a12055ad1e71.html
-
Size
426B
-
MD5
10306bcdd84c6d8fdaa3a12055ad1e71
-
SHA1
0a19a3ae837bb39f5ca5dfeae224d90e1e9366e1
-
SHA256
26a77f6b49a03629fce194084e88ea2867f2f7fa07434c1a0c8e622cc3a1bcf8
-
SHA512
dabbeadc6d799d2f6563e9a1d1f72ef8545e2c85b99911157e0b6c50647c6a3af6b8a0768ce226483b61218905bf6ce26b111b3fd543863596cebef3791d40db
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E45DF1C6-A77B-11EE-8024-CAE9171F1CAB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2904 2532 iexplore.exe 21 PID 2532 wrote to memory of 2904 2532 iexplore.exe 21 PID 2532 wrote to memory of 2904 2532 iexplore.exe 21
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10306bcdd84c6d8fdaa3a12055ad1e71.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:17410 /prefetch:22⤵PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD597e2c69859bc7891b5836f0326b1f9cf
SHA1873f7d4d3cd0f758ca1a571153aeb4a89310090d
SHA256881f8845c54fe028d4862d1dfa2f42d640a9924c4850c0d8816ff847b7e12260
SHA512d2ae9faa9df821638257048822ab9cafe7a2c61f2315a40a6605af73a0bf825141d2bf06549847cb8439e677030dbd864a6b944fe75550b5374e68e48fa97b64
-
Filesize
2KB
MD5d65db9daf63b93b54640629775a1d8d5
SHA15c22dd1a834a068bdd9693b483a1fdc10ba45ef9
SHA2564267e74f10381f9a557b434695226817cd5c52340b83153f8d08bb3ab39c589f
SHA51250cf88c003e803b2e25873fa04d30b702a1868ad62ed7c5d55a2c3bfffe4d1912319d57b63bf8fc6310a1d6eabf5ee6be4f99362e2e7b2fc1f4b0af15bdb18e9
-
Filesize
1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
1KB
MD56401c879e687886187c9929843c46016
SHA1105978fc9843ee49f25f91e9df0f30682c182d07
SHA256a34a4cdcad1f681974d8ffcefa66ac58adc5e2cafb623bbe9e90beb533b28b4b
SHA512e03691d17c4f0587065ed5a2097572acefd902f4a80be2ba52f401f5bdc913371508bca5dd05cd161d452a3b3fe64a1ec68c83cb8a88e43ce126e3db533861bc
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee