Analysis
-
max time kernel
0s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
1b7736980c76a8b76d3fa9bf0d234abe.html
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1b7736980c76a8b76d3fa9bf0d234abe.html
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
1b7736980c76a8b76d3fa9bf0d234abe.html
-
Size
1KB
-
MD5
1b7736980c76a8b76d3fa9bf0d234abe
-
SHA1
64b462d2a0f813ef43bcec46292bca6fd4d024fd
-
SHA256
cd5d9ba850e7621818f68bdc59e8ef67c82a306ea3ffd751a1c7bf12395848ce
-
SHA512
399821579101866e17144ea605393ed1f4a48288d21b445d7ea0b62c5a1a03b7dfd8f226f9cdfd9e90314a3781c0350b51e561010b22043e931dc63bd5cc3f72
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{00B9E551-A84D-11EE-A0B6-E650309876D8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1508 iexplore.exe 1508 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1508 wrote to memory of 3964 1508 iexplore.exe 16 PID 1508 wrote to memory of 3964 1508 iexplore.exe 16 PID 1508 wrote to memory of 3964 1508 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1b7736980c76a8b76d3fa9bf0d234abe.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:17410 /prefetch:22⤵PID:3964
-