Analysis
-
max time kernel
0s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 06:04
Static task
static1
Behavioral task
behavioral1
Sample
4aa2450d944230e6e33df81a1c56c7f6.html
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4aa2450d944230e6e33df81a1c56c7f6.html
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
4aa2450d944230e6e33df81a1c56c7f6.html
-
Size
1KB
-
MD5
4aa2450d944230e6e33df81a1c56c7f6
-
SHA1
b7efd322116216c4c09370064ae186dc490223b9
-
SHA256
93d90150a2f340a2efa325cde23df18c2398bd910a385fce76da61ea13ff4f21
-
SHA512
810d3a2fa966338beacfbd869b32d2324b5f95e733b14e584b932b605ee5d500a03bbf84b049eed6c2c892644b8a6a5a6320e7ab70e84fa8526b1bbfbed9563d
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C53DC69E-ADEB-11EE-AA35-56EE10B1B424} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3688 iexplore.exe 3688 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3688 wrote to memory of 1900 3688 iexplore.exe 16 PID 3688 wrote to memory of 1900 3688 iexplore.exe 16 PID 3688 wrote to memory of 1900 3688 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4aa2450d944230e6e33df81a1c56c7f6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3688 CREDAT:17410 /prefetch:22⤵PID:1900
-