Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
296ba70be845b29715bdef743c8521a2.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
296ba70be845b29715bdef743c8521a2.html
Resource
win10v2004-20231222-en
General
-
Target
296ba70be845b29715bdef743c8521a2.html
-
Size
47KB
-
MD5
296ba70be845b29715bdef743c8521a2
-
SHA1
038837484bdcd6bca860a2bfb4f9c6caeb7c8f65
-
SHA256
de7db242ad12d7e54b480db8bf19195563b25b226de81caf23f985fd1ccfba39
-
SHA512
3f166e0c039661b6bcbf8c70f9f46ef07e558d4042abde719f5c6a4b5afaddc19fb559b60bfe739fe3ebf5975bf95119e500f6c7d4d13f213c0f7dd49a35b694
-
SSDEEP
768:/7qoT0EipBPGoK+yLKajeKzb0nm531HBdYsNnUiiT:/ZTupBPGoKZkKzb0nm53NBdbN0
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{571F8733-ABDF-11EE-AA35-52ED22FB7E6C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4896 iexplore.exe 4896 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4896 wrote to memory of 1100 4896 iexplore.exe 16 PID 4896 wrote to memory of 1100 4896 iexplore.exe 16 PID 4896 wrote to memory of 1100 4896 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\296ba70be845b29715bdef743c8521a2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4896 CREDAT:17410 /prefetch:22⤵PID:1100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD51944af3661da46249991197817b6cd8b
SHA1f952df40ec79fafc7c798f37aff92878977376ed
SHA25663326a1c4e0eddd3501f0a064b06a2708eb0362f3ae934f53145978d3d0799b5
SHA5120bef19b32be337cfba179ed9ce4533a207cfe645d2e5fe0da9fadc7b01c72704fc89749670d1ac48b8d494675bc62ac089fdc4d8495979226f10828225594376
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee