Analysis
-
max time kernel
1s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 07:25
Static task
static1
Behavioral task
behavioral1
Sample
2d4e6e22e5967da22f9617e868c720af.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2d4e6e22e5967da22f9617e868c720af.html
Resource
win10v2004-20231215-en
General
-
Target
2d4e6e22e5967da22f9617e868c720af.html
-
Size
3.5MB
-
MD5
2d4e6e22e5967da22f9617e868c720af
-
SHA1
801892b092616ba064cf2c94dab6364ed4a1d4a5
-
SHA256
2616c30fa61e590c25dbc77d1c0c62359141c07984415def464b3b9f7479c9b8
-
SHA512
03063d56115086940736782e643b2c79fa798d1c41f56421258f51d8f3822b697fa35347c10dcde9e783e9bc1cf2a1fb18743de0b50c6cc3120cff652dd4a9f7
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NbM:jvpjte4tT6ZM
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{88B354F1-AF44-11EE-8024-4ECC77D3B663} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3544 iexplore.exe 3544 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3544 wrote to memory of 4940 3544 iexplore.exe 17 PID 3544 wrote to memory of 4940 3544 iexplore.exe 17 PID 3544 wrote to memory of 4940 3544 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d4e6e22e5967da22f9617e868c720af.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3544 CREDAT:17410 /prefetch:22⤵PID:4940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5b82902e915941e80eb5e7be73e0bb02d
SHA18cb044f1724aca9a90596d88c56d191b0163fc35
SHA25657440d50573201be243cf31c92b6c539c576337933dcc2e48e8a3fc54e675c39
SHA512f3e346ba011ae01081cd48465cfe59ecee820197bab787ccdf8d3f7566836bc03dbc865074542b1d1d0fed898ff5b4c36558a910b78100651d1bf61bb0d8e5cd
-
Filesize
23KB
MD55ce3de2b803a1297ca4933c78897267a
SHA1949684065c64cf378a9250a9a2f19db432a502af
SHA256528141e06ac4df531614ba2d6db154b4434fa7137ae91351c54eb2f8c030dd25
SHA51277250468024f26d8d0bb20eed6a782cda26a123fedc7a9e6eee3bd1d9464afa7a1ded52b1d5689ef0b4e771e90f7ce1fccc004161619de81817bf20a7174323d