Analysis
-
max time kernel
0s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
2427a92fa4a42b9b94277575a5307199.html
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2427a92fa4a42b9b94277575a5307199.html
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
2427a92fa4a42b9b94277575a5307199.html
-
Size
23KB
-
MD5
2427a92fa4a42b9b94277575a5307199
-
SHA1
a7fd65f301bb00f2291181f0b0c1429cebaabd7f
-
SHA256
a36543a377e6c97bdc7f86134a12bdbdba5810219f3202a2fb3e91fc028c10ec
-
SHA512
5d5990e13976582852c44af5e7b2109fedb3cb0d118cf620994b0c4464c64cab814047d1ab6d22a2ed367d3e51ca3f7b7c7a719115634e00cb630ddf818bf2f6
-
SSDEEP
384:TI+DNUxYtesJVA7LLjZN4KnLhmNwse47LLjZN4137ua3jYzN5cSrP585qtUKjJuj:to7LLjZN4KnLE7e47LLjZN413753jYzq
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C11A8D81-AB81-11EE-9963-7E4216712C33} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4488 iexplore.exe 4488 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4488 wrote to memory of 3300 4488 iexplore.exe 16 PID 4488 wrote to memory of 3300 4488 iexplore.exe 16 PID 4488 wrote to memory of 3300 4488 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2427a92fa4a42b9b94277575a5307199.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4488 CREDAT:17410 /prefetch:22⤵PID:3300
-