Analysis
-
max time kernel
14s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:41
Static task
static1
Behavioral task
behavioral1
Sample
103bc63cdfe67abb284c943fcec0b6a8.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
103bc63cdfe67abb284c943fcec0b6a8.html
Resource
win10v2004-20231215-en
General
-
Target
103bc63cdfe67abb284c943fcec0b6a8.html
-
Size
57KB
-
MD5
103bc63cdfe67abb284c943fcec0b6a8
-
SHA1
83d35f7415735b8882e88edb8dd604d4fa107ea2
-
SHA256
cc8c213ceba30f47a7148a831cd4b1ae7e68a98039043a5b6064ceb1f6f847ba
-
SHA512
4dc2a9f949eabfb0d2431a007380539516e96c5a0e80f89becd40876e8f158a645c97a8d961ca8dadb29fd0dd83746be0328c2679bbad44befeccba85cc490f9
-
SSDEEP
768:zLV7pHvvCIooVzU2sJzDEaF+2fDyEDQ8Rh3V4++G/:zRFHv7oKzUZzDEaF+2fD9DQmh3VOG/
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{6104DC0E-A77D-11EE-9A4E-5A2E32B6DBC3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4604 iexplore.exe 4604 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4604 wrote to memory of 1812 4604 iexplore.exe 53 PID 4604 wrote to memory of 1812 4604 iexplore.exe 53 PID 4604 wrote to memory of 1812 4604 iexplore.exe 53
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\103bc63cdfe67abb284c943fcec0b6a8.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4604 CREDAT:17410 /prefetch:22⤵PID:1812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BP0ZYM9B\platform_gapi.iframes.style.common[1].js
Filesize24KB
MD58877a245ebd28247d61e7b55cf7fbe9c
SHA13c119029c740cb6ac8c950c4fa6f570d22f709c7
SHA25610767aac2cbbe97d2cd8b8bccdb43f7fbc7d5f938d0a232735927fcb8cda9bfa
SHA512c5b88c2f30e77823b0e89ccec5b7581b3a815314828c30f7af7c1424869fb58c6d2438c716549fe1e9a5efeed56b7b59f75057f67cf872fec42dae2da9edee7b
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee