Analysis
-
max time kernel
0s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 06:35
Static task
static1
Behavioral task
behavioral1
Sample
113268842982d6c81080eeb37ebb5a73.html
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
113268842982d6c81080eeb37ebb5a73.html
Resource
win10v2004-20231222-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
113268842982d6c81080eeb37ebb5a73.html
-
Size
71KB
-
MD5
113268842982d6c81080eeb37ebb5a73
-
SHA1
661ba7c7e3f977d0f7f61c1cced5ac632ef73b22
-
SHA256
ec92f355a1ed0aad8b35233bf7200525a6e378d08275e9d90194ab48e899fbb6
-
SHA512
85c5bf539151b1439d69d3b8b0f74f5c778bbacc551d6a304382827ef84200c55d4cd097c09a552ab8b5df05550f55e985ff21957d3a9e9591a0f952a35245ed
-
SSDEEP
1536:+DqE+ycJIZWEjWS9teey75IIRXepaLVKS9tgdSyhIOIOI2:+DqS10S9Yem5IIRXecxKS96dNh5
Score
1/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{0B1CC520-A78F-11EE-A0B6-F2334ED3B5DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1508 iexplore.exe 1508 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4784 1508 iexplore.exe 19 PID 1508 wrote to memory of 4784 1508 iexplore.exe 19 PID 1508 wrote to memory of 4784 1508 iexplore.exe 19
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\113268842982d6c81080eeb37ebb5a73.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:17410 /prefetch:22⤵PID:4784
-