Analysis
-
max time kernel
0s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
4619c8ab7ef7a8ad363c90c71f2b48c0.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4619c8ab7ef7a8ad363c90c71f2b48c0.html
Resource
win10v2004-20231215-en
General
-
Target
4619c8ab7ef7a8ad363c90c71f2b48c0.html
-
Size
36KB
-
MD5
4619c8ab7ef7a8ad363c90c71f2b48c0
-
SHA1
56f94ff537de09d5a3a1c9931ad36b42b7fac395
-
SHA256
cb7c59f04f5abe3358ce461a2678f1cf17ff44cedf41fe88ba0ce0c562c63a37
-
SHA512
23bcc311279a0e9699a0f38cdb8db5176508e76c20cfa40e613c89a7aa28f2dea665fa463fbde09e5c09bec7867d6a1b9d68b132f079c7bbc2a765e4e96cf1c3
-
SSDEEP
384:qkkoN3B3IjlHss6aIHvXfCIoo76c4ZIgh6QtB6qEoq4RgdBnxL3xjAxSX7LdllFA:qk7pHvvCIoo78IEB64dRg9FBX7LXc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{973E2BF1-AC85-11EE-9DE3-E6B549E8BD88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2388 2732 iexplore.exe 16 PID 2732 wrote to memory of 2388 2732 iexplore.exe 16 PID 2732 wrote to memory of 2388 2732 iexplore.exe 16 PID 2732 wrote to memory of 2388 2732 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4619c8ab7ef7a8ad363c90c71f2b48c0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD559d1ff5a54d3915ee784b393f0e296f8
SHA1a218aa9ee712366213f53071fcb8feea4e21e8e6
SHA256a190129f0d28dd791439ed66c5401d71a9be0e20683fd4f17acea57b7f27285e
SHA512816c78542993ad347e14791a33fede1e3cc5427a09f3da0c4d67263286c470e8b2d8df7c227b99bd45f2dcb6ab546ce6b2e57f41f8e9d1e0916f2fecfaaf6e9f