Analysis
-
max time kernel
0s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 02:35
Static task
static1
Behavioral task
behavioral1
Sample
24aa559b8638751a46d4f657c2e22726.html
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
24aa559b8638751a46d4f657c2e22726.html
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
24aa559b8638751a46d4f657c2e22726.html
-
Size
61KB
-
MD5
24aa559b8638751a46d4f657c2e22726
-
SHA1
58d12011feeddd2d2a9715f637fdd2cadfc1fc08
-
SHA256
922b4b6c161a6178bd95d5c92c246fcac71bf0ad08f40226ed8b59e406ceec85
-
SHA512
048b03df8f9342dced636ca702a9e21a590490484124429ab6984762f85b3f046e36e349da82271e2bbf57562a186a283f69c6ae8dcbc1237954dc4f0718bd0c
-
SSDEEP
1536:+kAtkAVckABKQJZkAgh3cr0Y8GNMxZPdJXxPxQckAn+SHvFSEwKvrFfBTrgoVWLr:+kAtkAukAImZkAc3cr01GNMxZPdJXxP8
Score
1/10
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CF93E3CC-A8FC-11EE-8184-4E55496B34AD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2692 wrote to memory of 5096 2692 iexplore.exe 16 PID 2692 wrote to memory of 5096 2692 iexplore.exe 16 PID 2692 wrote to memory of 5096 2692 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24aa559b8638751a46d4f657c2e22726.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:17410 /prefetch:22⤵PID:5096
-