Analysis
-
max time kernel
0s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
142127aaac6b7d58dca360c0034b9c09.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
142127aaac6b7d58dca360c0034b9c09.html
Resource
win10v2004-20231222-en
General
-
Target
142127aaac6b7d58dca360c0034b9c09.html
-
Size
895B
-
MD5
142127aaac6b7d58dca360c0034b9c09
-
SHA1
cb2d17810c5187843ccf09e2e9942224a688ab93
-
SHA256
8c41ec23bc8a79f5d257a0fabe5fa3c4ad5cb1786ae2cc705a20821cfc1e2e18
-
SHA512
c0ac0e08cfe25a8dd11c1be35892becbf70a90524f0d58c6ad02c36d8e5bb5938193002a23a070bb35f6b13f8da4fa5038050109a995a4e88e94205738848daf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{63714714-A7C1-11EE-A0B6-F2334ED3B5DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1060 iexplore.exe 1060 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1060 wrote to memory of 1664 1060 iexplore.exe 17 PID 1060 wrote to memory of 1664 1060 iexplore.exe 17 PID 1060 wrote to memory of 1664 1060 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\142127aaac6b7d58dca360c0034b9c09.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1060 CREDAT:17410 /prefetch:22⤵PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c025c0c0d28c57d952fe785968cf46e0
SHA1a1fced126dbfd472f4b5c11e406154b635d4320a
SHA256dc204676a056d3e82d637f6b97c8c29b9f5071bf354a177cdcce094c2b07abe9
SHA5128c44251404f29b1bd886e271598eade279d7a5e5640d6cbde886c5ddf386243f06c62ac77c1da0bb82de4ef11611cb3765da90497b8dd7afff132eabcaddb7b4
-
Filesize
1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c