Analysis
-
max time kernel
0s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
27b8bbc6f1fd772c5bbe9bf80d3fd1b5.html
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
27b8bbc6f1fd772c5bbe9bf80d3fd1b5.html
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
27b8bbc6f1fd772c5bbe9bf80d3fd1b5.html
-
Size
18KB
-
MD5
27b8bbc6f1fd772c5bbe9bf80d3fd1b5
-
SHA1
3ba524170a7e7db8481f1e89d1eb9af6d6fc65af
-
SHA256
0d0b1815bb8780a35ede4c06836e4daaf104c66733dda07dcc9bd1c11fb6de90
-
SHA512
578d8de8fbbbf6e7ad9fb3dc1a176596badb1cc4229ed44b992b14e66a4a9376617f26a28eb036b040dbe8f982e5c3c70dfdf0928f3643f623b5dc15d1421ae3
-
SSDEEP
384:0nz1vQNsahr1AgdGgs8jMaztTLPAuz68MMv07e:AzK6K1AgdGgs8jJO8ts7e
Score
1/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3781B4D5-ABC3-11EE-AA35-DAD4CCDE76B8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2876 wrote to memory of 1964 2876 iexplore.exe 16 PID 2876 wrote to memory of 1964 2876 iexplore.exe 16 PID 2876 wrote to memory of 1964 2876 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27b8bbc6f1fd772c5bbe9bf80d3fd1b5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:17410 /prefetch:22⤵PID:1964
-