Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 07:05
Static task
static1
Behavioral task
behavioral1
Sample
11b59f986c1c6fdc47691b597af0b6fd.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11b59f986c1c6fdc47691b597af0b6fd.html
Resource
win10v2004-20231215-en
General
-
Target
11b59f986c1c6fdc47691b597af0b6fd.html
-
Size
17KB
-
MD5
11b59f986c1c6fdc47691b597af0b6fd
-
SHA1
5a7efd82fb1aad555d583b3ddfd0329f67f7c671
-
SHA256
e73e9c40278a3e16e15fa990ee0fe30abe3dc0165b854523cd57cce48e39cee5
-
SHA512
2f621d9b466cdbab941221e6759d6322626e879f887a821a3f63e24a6e6e7c5113fbbfe2bdedf721e62f140d6a0785890463e819674efb5b12a8471f4aa2eaea
-
SSDEEP
384:iEcX8TkDmQJNU4LfVwLFGg9ylzi6DzUzsQNmoc2V:PcX8g08f7g9y1j1QNm4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{18F54DBA-A878-11EE-9963-CAE9171F1CAB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3144 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3144 iexplore.exe 3144 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3144 wrote to memory of 2024 3144 iexplore.exe 16 PID 3144 wrote to memory of 2024 3144 iexplore.exe 16 PID 3144 wrote to memory of 2024 3144 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11b59f986c1c6fdc47691b597af0b6fd.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3144 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
438B
MD53c0b7d5734427774f6b6085dcfb7b7f7
SHA1cf3726bd232ea268a8d28c77b10e7095e1cf1291
SHA256005596a08245cd7c6e1fd8f0c52532e8014a2c9cf35a3f1a7b9099cf81ab3457
SHA5127852972d0532934cd5542b4f1536e5669b618cbe26cd250d44e9238699e69b17614fb74d17818ffd1a29ffb68338d23cee9eeed93f31db287184ae69eb095220
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
92KB
MD54e1ddb20b9ed7a68ba00e95bb62f7be3
SHA1583406a19ed2f7bf3dc60e6653147160b8b08117
SHA256f7ec5f00148c5eb2875103c0a5e8924459561aa063e06b4b717df09610d7c02e
SHA51283f35cc409860df260bf7a2b84ffc94ac21e38ff59bda7e72c0eabfbbf8d42e24d5173ece167aba7cd6878730e56b67be90f666f53e05b3dc535a5cd4a2755da
-
Filesize
92KB
MD572031ee478461d2627be7c82c98ae793
SHA159a568847bcb53d1768d26a826097daf9c0aef12
SHA256a0599d9d2ed8dd7f87739fce8c3c181075149a3a23f49d2c8af646811d7e6ed9
SHA512f0a2d89044f4c97b7c37d627b7465d6762628f4cbe652a5c161c61b8878e46a52308e4a2c0327e092d9f1f2885f57937c9143d05520edf293a260417e12a6991
-
Filesize
12KB
MD5a2d42584292f64c5827e8b67b1b38726
SHA11be9b79be02a1cfc5d96c4a5e0feb8f472babd95
SHA2565736e3eec0c34bfc288854b7b8d2a8f1e22e9e2e7dae3c8d1ad5dfb2d4734ad0
SHA5121fd8eb6628a8a5476c2e983de00df7dc47ee9a0501a4ef4c75bc52b5d7884e8f8a10831a35f1cdbf0ca38c325bf8444f6914ba0e9c9194a6ef3d46ac348b51cb
-
Filesize
5B
MD583d24d4b43cc7eef2b61e66c95f3d158
SHA1f0cafc285ee23bb6c28c5166f305493c4331c84d
SHA2561c0ff118a4290c99f39c90abb38703a866e47251b23cca20266c69c812ccafeb
SHA512e6e84563d3a55767f8e5f36c4e217a0768120d6e15ce4d01aa63d36af7ec8d20b600ce96dcc56de91ec7e55e83a8267baddd68b61447069b82abdb2e92c6acb6
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
530B
MD50a127ad39a8ebe4207492293b556adf6
SHA117d3dad64e4f9139cfb85bbcca6659a8aa532a48
SHA256c1294965425b5028a83bbe5eeed0cd9b92733ec41efd07e34532522d4c97b6e1
SHA5125aa845c5c6c20259d9c6bc0c9fdbd13ff178ba4008865f7113387767db0ad39cd53c1d276cfa4997186fd39f21d30bf00caf8d092e5c04119d992368b1563df3