Analysis
-
max time kernel
0s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 14:10
Static task
static1
Behavioral task
behavioral1
Sample
3946d83eb6577aef51c0376575429e12.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3946d83eb6577aef51c0376575429e12.html
Resource
win10v2004-20231222-en
General
-
Target
3946d83eb6577aef51c0376575429e12.html
-
Size
32KB
-
MD5
3946d83eb6577aef51c0376575429e12
-
SHA1
daff7217d660dd83b0250e16fb78148952d9661c
-
SHA256
3238b8d8ba5195024829c8f89d10225d541f3e77cf45eb620431a0af12b48250
-
SHA512
869ebbf1f7cacb6ac3a25c19a71139d551e8c7d2691d72f48439ee30db9ea92b665e2ad50a2e87dea08305dee0809e407d9ef84fb1e64b9f9857de49d53aca45
-
SSDEEP
192:xUBkVAb9YCT73NgFGapdYNR4KSW1E1nSLiiMWoOTxwN5MfBJN39f2Ct0R4hiehXt:af1eYXTB50nelOf1BFzu
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D743B862-AFF6-11EE-AA35-6207E08AD8FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3968 3020 iexplore.exe 16 PID 3020 wrote to memory of 3968 3020 iexplore.exe 16 PID 3020 wrote to memory of 3968 3020 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3946d83eb6577aef51c0376575429e12.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:17410 /prefetch:22⤵PID:3968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize3KB
MD5e0e4a201fcb6a9738dcb6513a6a83650
SHA122bee4f21790e4d138a48eb863b61be36667cc89
SHA256a675149f9dabf9bbeafd619d5ce741b2ceee28c6ebfcc44b982e88c268db02eb
SHA5129be2c492428f5ef03dd430464c56d1fff257a3ced431816eb36613728b294c7f44239c60d381ef0fb6588d6eea898750135e504ec0a3525ffa99e7c15751f2e6