Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
4a752099cbab14c058318c9691eb2971.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a752099cbab14c058318c9691eb2971.html
Resource
win10v2004-20231215-en
General
-
Target
4a752099cbab14c058318c9691eb2971.html
-
Size
88KB
-
MD5
4a752099cbab14c058318c9691eb2971
-
SHA1
31502b8948d7a6726da070749ba0835c5cc92e51
-
SHA256
3d3ba56a362f3a8b10790ba8604d0cea48169a0b853634712980dbf6da2242d8
-
SHA512
e6080b257ce2a6fc906aed4d461e688d4b18520b5fd08c9b376f8ae483968e0dadc4ff3488027c02de5dfe790eca073e9fb644905b9ca0f49ed814a300df8a27
-
SSDEEP
1536:IMzrHoEohVtGYfx8TTgfs4kYD0bUwHmE4UE6Ftm:IPntdfx8TTgZkYD0bUwHmE4UE6Ftm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BEAD0D65-ADDF-11EE-BD28-C6E29C351F1E} = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4312 iexplore.exe 4312 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4312 wrote to memory of 4996 4312 iexplore.exe 16 PID 4312 wrote to memory of 4996 4312 iexplore.exe 16 PID 4312 wrote to memory of 4996 4312 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a752099cbab14c058318c9691eb2971.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4312 CREDAT:17410 /prefetch:22⤵PID:4996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD51944af3661da46249991197817b6cd8b
SHA1f952df40ec79fafc7c798f37aff92878977376ed
SHA25663326a1c4e0eddd3501f0a064b06a2708eb0362f3ae934f53145978d3d0799b5
SHA5120bef19b32be337cfba179ed9ce4533a207cfe645d2e5fe0da9fadc7b01c72704fc89749670d1ac48b8d494675bc62ac089fdc4d8495979226f10828225594376