Analysis
-
max time kernel
0s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
38bc35f7b61dd4e75fb0175584154ffc.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38bc35f7b61dd4e75fb0175584154ffc.html
Resource
win10v2004-20231215-en
General
-
Target
38bc35f7b61dd4e75fb0175584154ffc.html
-
Size
90KB
-
MD5
38bc35f7b61dd4e75fb0175584154ffc
-
SHA1
59313c062cb50b0adeaf6d3f7e1dca40563f93fe
-
SHA256
a1afd35fb5c1fd5e16371073dab18f07bfcc6c33f6affde4edc48d2bcc65c6ea
-
SHA512
8cf1fe355239644f0a3e5f091c2e87b1bde1995b3f321d47439a8c455b7d57b79645ffd5d6f0e29ccff7d69b04c99a31f3683067aae16f6a3c0cb7403cb001d5
-
SSDEEP
1536:dVSI4nEu2WmRRqYIuVFwr6jfedyScDV12xwVKho5GjPfvYMl4Ip:unEuFG9Cy5DVi/Yc4Ip
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{31D4A859-ABC4-11EE-9ECD-7E4216712C33} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4148 iexplore.exe 4148 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4148 wrote to memory of 2108 4148 iexplore.exe 18 PID 4148 wrote to memory of 2108 4148 iexplore.exe 18 PID 4148 wrote to memory of 2108 4148 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38bc35f7b61dd4e75fb0175584154ffc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4148 CREDAT:17410 /prefetch:22⤵PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
51KB
MD5575b5480531da4d14e7453e2016fe0bc
SHA1e5c5f3134fe29e60b591c87ea85951f0aea36ee1
SHA256de36e50194320a7d3ef1ace9bd34a875a8bd458b253c061979dd628e9bf49afd
SHA512174e48f4fb2a7e7a0be1e16564f9ed2d0bbcc8b4af18cb89ad49cf42b1c3894c8f8e29ce673bc5d9bc8552f88d1d47294ee0e216402566a3f446f04aca24857a