Analysis
-
max time kernel
0s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
45115477e6e070b814b96023a3d4c551.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
45115477e6e070b814b96023a3d4c551.html
Resource
win10v2004-20231215-en
General
-
Target
45115477e6e070b814b96023a3d4c551.html
-
Size
7KB
-
MD5
45115477e6e070b814b96023a3d4c551
-
SHA1
91ee8d4279b5afd0c3198c61d841ed6a9e87145f
-
SHA256
ae500da7e53630af0c5bd0f9c4c7d560698f50c472fea9d98fc9ff37816c8043
-
SHA512
921672ad3df34d4fcfffdecb956076f8e16d8019c68e7ffc33cff0e7e7d9e6e864d89e4e1ce608b9822385216af9598d5fac113db9be90f23284d8821f0c960f
-
SSDEEP
192:K6m4D5j9PaxlpEKb41a/gi9ECIh3fuOQ9d6hRJceEOuoGNNLEDjsqe1F:K6m4D5j9PaxlpEKb41a/gi9ECIh3fuNb
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{8F59ACDB-AC3D-11EE-BD28-4643CEF3E9DE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4072 iexplore.exe 4072 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4072 wrote to memory of 3608 4072 iexplore.exe 19 PID 4072 wrote to memory of 3608 4072 iexplore.exe 19 PID 4072 wrote to memory of 3608 4072 iexplore.exe 19
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45115477e6e070b814b96023a3d4c551.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4072 CREDAT:17410 /prefetch:22⤵PID:3608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD57c0e215df43dd4ce31cc57b370c87e12
SHA1e0783301caadd30f9550d9b15f3eec0137176705
SHA2561238bb2d3c7f22fc807aaeca959dbf20a71b0ef049442ca8a2cea5b17c126c07
SHA51261c5401cba5704f23a95847aba1d13a626ccba8a24e8604dd5da3cbbe92552552467ef4da4e5e0cc7a53194e02fa7b9ddb2dead3f0d867bb614526cc4963a5aa
-
Filesize
1KB
MD5c6bdda3f990d9f4af799c6780b8859b4
SHA1a621164f6b814af5e867c84e7b014695c850fc7e
SHA256bf1d3d4bd2bfaf7e1c3ecda4669a16a68da4c2780c49c60b09d3fbc13a1633dc
SHA512955019d37611587f11831068a20a8b7f2a51838d6c11d02c822aa752fc056ba1336ce2d8f1e7d338fee9b3c9b11889ab8c615a1f60183f27cb060b3976033443