Analysis
-
max time kernel
0s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 05:53
Static task
static1
Behavioral task
behavioral1
Sample
10714c757ec8a5a99c8cf0b74271d6bc.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10714c757ec8a5a99c8cf0b74271d6bc.html
Resource
win10v2004-20231222-en
General
-
Target
10714c757ec8a5a99c8cf0b74271d6bc.html
-
Size
71KB
-
MD5
10714c757ec8a5a99c8cf0b74271d6bc
-
SHA1
676ca5cf14a756a3d83cea0c1c3756236a83962b
-
SHA256
d74752f62a1eed23c5acbfc7447171b1c32bd792a73880cafb5450be91fa0faa
-
SHA512
5b342a18ccfca32a77f8dbc575c9f41abfc7dabd202f3878e4aae0407abd5364e12a5a7e43d83ca7a280709cee85349bf1af01ea335f440c0f063e32699891eb
-
SSDEEP
1536:AkGLNGZg7L9XA9sAogJ8JeSXgqnTjL8xKO/wyHWVULZpTdpUsmd3f4yaiVSQgvbj:Akw7Lu6IOLS/vY+mOxgF4DtN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2CB72E4C-A782-11EE-A0B6-766E2D171A79} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4572 iexplore.exe 4572 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 3772 4572 iexplore.exe 16 PID 4572 wrote to memory of 3772 4572 iexplore.exe 16 PID 4572 wrote to memory of 3772 4572 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10714c757ec8a5a99c8cf0b74271d6bc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4572 CREDAT:17410 /prefetch:22⤵PID:3772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5ef7e600e75b69943888a45bdce7d2938
SHA13c780e1b92198ddfc7e3e5759874f006f18272b7
SHA2563c1c1f39f5bcc2cf8c0b4664b18e7cc2fd14c05ec5ff914327d1d8b1cd184218
SHA512c0cecf3cb14990db6507d151ed1468cfa35bfdcbe4fce22631dbba5672bb60c326a34e3a8d97a778ed6e2cc76a80ef8b1afd31a44c8cdbfcdfd4ac7c496847dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5da9c54dc361c2d1bbe53a3ebdc24a104
SHA1ae8cd49d13a81052b3a8fa5f91d20a09dee1fbcc
SHA25629772819863c6cbf16124ad2c2cf1baf655c4736ebe8cef944d7c53ecef84a2f
SHA5123aec205eb8f50f9543f160d89656ac3b07402ebc2f27ad3f9ed198b6d290ccc2cedbcff85a22d2556e2408e317be5e992fded7b8feb0a7226077cfa428325782
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d