Analysis
-
max time kernel
0s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
22f5370cdf2357b2fa8cd0d17394b5ec.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22f5370cdf2357b2fa8cd0d17394b5ec.html
Resource
win10v2004-20231222-en
General
-
Target
22f5370cdf2357b2fa8cd0d17394b5ec.html
-
Size
3.5MB
-
MD5
22f5370cdf2357b2fa8cd0d17394b5ec
-
SHA1
7f93eafb62195f8fb6da456159eecd53b86bbf22
-
SHA256
f39b3fd5b57df6de05476b98a3bb47c0c8adeb6192d2855ae82d7702ed7ab3b9
-
SHA512
20e6e109ed3a59718cff9d1fd7cca87a221ade43462493593d1ee410e6870143c852bc7d8495552aa01fd6e6aed423bbf168eae1e650ee37dc94fd555ce52f4c
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NNJ:jvpjte4tT6DJ
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{33284271-AB6F-11EE-A0B6-766E2D171A79} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4028 iexplore.exe 4028 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4028 wrote to memory of 4888 4028 iexplore.exe 16 PID 4028 wrote to memory of 4888 4028 iexplore.exe 16 PID 4028 wrote to memory of 4888 4028 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\22f5370cdf2357b2fa8cd0d17394b5ec.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4028 CREDAT:17410 /prefetch:22⤵PID:4888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
83KB
MD52f6b11a7e914718e0290410e85366fe9
SHA169bb69e25ca7d5ef0935317584e6153f3fd9a88c
SHA25605b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
SHA5120d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db
-
Filesize
57KB
MD5182bd42a2d8690f52269aeb49cc3a83b
SHA13218c033a7f6beec415c3ceb4999596ae6cd1127
SHA2564dcf26118fae9178521fd825f41e2655bf4b9a8b632c87519f65fe0a8658d35b
SHA5122c6042dfef01342f513b76bff258f01c89bef9bbb97849b9108c1c7263e66703a7f02c5f2a427598d6e0a1607d4f7fab57d476ee2282d6288706087b9fb5a758
-
Filesize
19KB
MD5dd1d068fdb5fe90b6c05a5b3940e088c
SHA10d96f9df8772633a9df4c81cf323a4ef8998ba59
SHA2566153d13804862b0fc1c016cf1129f34cb7c6185f2cf4bf1a3a862eecdab50101
SHA5127aea051a8c2195a2ea5ec3d6438f2a4a4052085b370cf4728b056edc58d1f7a70c3f1f85afe82959184869f707c2ac02a964b8d9166122e74ebc423e0a47fa30