Analysis
-
max time kernel
0s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
23a80b30deb03ad44f846040ed27cec8.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23a80b30deb03ad44f846040ed27cec8.html
Resource
win10v2004-20231215-en
General
-
Target
23a80b30deb03ad44f846040ed27cec8.html
-
Size
430B
-
MD5
23a80b30deb03ad44f846040ed27cec8
-
SHA1
4152461de2bd0d1a5571597f7c6a538b35cbbe71
-
SHA256
b4908211b9f5d74966ab9525ac3c84e9498cf1a60b412ea8b0527fee79f276f9
-
SHA512
fde878f23c62b9c0ef646185bd2d9df73573ea8748f4f2e1b3959cc67bc739fcc72487974c8cc38d67ea784990189aefab3b1d60db2359f86d8893858512f1cc
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{4D2D1BB8-AB7A-11EE-9963-7AA08ABF42A0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2704 iexplore.exe 2704 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2704 wrote to memory of 4232 2704 iexplore.exe 17 PID 2704 wrote to memory of 4232 2704 iexplore.exe 17 PID 2704 wrote to memory of 4232 2704 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23a80b30deb03ad44f846040ed27cec8.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:17410 /prefetch:22⤵PID:4232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
2KB
MD50a82fbf19794087dcc85901455d14489
SHA185e31bae680f31580bc8520f9fed6157239a9a0a
SHA25608dbc282efa4cb2b6f0e47060e3eda0a610b3e908c089b05fb81c2fbc865c416
SHA51297552a17c4db0d3e3ba2741bd27e3abe6bc881784c92a9fcf0fd07787257e116ab9acb738638f265035bf3e8d7e2839dfc4e37eb272a40758aa4cb2a691d6fbf
-
Filesize
1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c