Analysis
-
max time kernel
0s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
12ac8887b2517934b6849087193871b3.html
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
12ac8887b2517934b6849087193871b3.html
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
12ac8887b2517934b6849087193871b3.html
-
Size
3.5MB
-
MD5
12ac8887b2517934b6849087193871b3
-
SHA1
3aee106f217b2f192e6120846255e4276619b1c7
-
SHA256
59c3c8e70db80d381bbcdc7ec8174206bd2961d2fbdf98d29ee2b88be6cddb10
-
SHA512
8fa70363388f88a517a47be59c0212a59b41dac418c21ed01d151c68aea96c61b7881585ee181ea10b47842c110c00f95255c430e34eec7e9811c0da5d06eea5
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NSj:jvpjte4tT6Mj
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E9C65148-A7A8-11EE-8184-F21AB124C203} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 696 iexplore.exe 696 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 696 wrote to memory of 4924 696 iexplore.exe 16 PID 696 wrote to memory of 4924 696 iexplore.exe 16 PID 696 wrote to memory of 4924 696 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12ac8887b2517934b6849087193871b3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:696 CREDAT:17410 /prefetch:22⤵PID:4924
-