Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
2c323f8060297f9f6140b593f9072d67.html
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c323f8060297f9f6140b593f9072d67.html
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
2c323f8060297f9f6140b593f9072d67.html
-
Size
12KB
-
MD5
2c323f8060297f9f6140b593f9072d67
-
SHA1
1cce0f869a1defb8b949c53c519189dac10e52be
-
SHA256
30fb23a17b652869ce2ae32b89fe0a5264939d517a1c352fcda6b3e564ea7997
-
SHA512
ca701baff7b818985927426bda2a82303a887ddb455ef08a0a364a23eecac77d15d24da21a455083025d230453f9a165d8ba420249e12f79746a1a331d13fda0
-
SSDEEP
384:pt8n0nC/SoWKt7vJX21U95kMg/hsGxGY+A:P82oWKt7vJ21U95kz/uGoYL
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{77E5D781-A961-11EE-A0B6-66BCDF92515D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1532 iexplore.exe 1532 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1532 wrote to memory of 3232 1532 iexplore.exe 16 PID 1532 wrote to memory of 3232 1532 iexplore.exe 16 PID 1532 wrote to memory of 3232 1532 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c323f8060297f9f6140b593f9072d67.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:17410 /prefetch:22⤵PID:3232
-