Analysis
-
max time kernel
0s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
3c49a65b30f32126d0fc817fc35acb06.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c49a65b30f32126d0fc817fc35acb06.html
Resource
win10v2004-20231222-en
General
-
Target
3c49a65b30f32126d0fc817fc35acb06.html
-
Size
3.5MB
-
MD5
3c49a65b30f32126d0fc817fc35acb06
-
SHA1
7e7ee218ed06de285bd16b536e33a604e16bf956
-
SHA256
54195b6b60d1f55a06051742be358d56f5bd9c017beefc63e2eaece83a320c11
-
SHA512
f5fbf5587d7ebdb2ed245e047584438e174a79b2ded48da9da4c35c1b7d5f8ddc530af3d03f7c4afda1f2544b7204694cf544881d28e82f50b0391c952a7c939
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NSi:jvpjte4tT64i
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{73F842C3-AC47-11EE-AA35-EA04B8DEDBF3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3300 iexplore.exe 3300 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3300 wrote to memory of 3776 3300 iexplore.exe 16 PID 3300 wrote to memory of 3776 3300 iexplore.exe 16 PID 3300 wrote to memory of 3776 3300 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c49a65b30f32126d0fc817fc35acb06.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3300 CREDAT:17410 /prefetch:22⤵PID:3776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD52f6b11a7e914718e0290410e85366fe9
SHA169bb69e25ca7d5ef0935317584e6153f3fd9a88c
SHA25605b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
SHA5120d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db