Analysis
-
max time kernel
0s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
4bc3abc7de936bea8e6b8706f18bdb2e.html
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4bc3abc7de936bea8e6b8706f18bdb2e.html
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
4bc3abc7de936bea8e6b8706f18bdb2e.html
-
Size
1KB
-
MD5
4bc3abc7de936bea8e6b8706f18bdb2e
-
SHA1
8dca40f899b7243744035fc51d35fe2be0df0829
-
SHA256
e81ebf9bb0bbfb3460ad2166badec0a9ac21f22ef4878e4bd3d5ea6d78655efb
-
SHA512
eb4a6205c27b22e0a33d666255a371e8d64ccd62d244a1fa5f366875f2c9d326e2182ef8e92ab3a73c402e5bbdeaaaaaacea8deb8cc261827309c73202c17e1d
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{4A53A56E-AE38-11EE-A0B6-5A0B45D0E1CE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3164 iexplore.exe 3164 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3164 wrote to memory of 3764 3164 iexplore.exe 16 PID 3164 wrote to memory of 3764 3164 iexplore.exe 16 PID 3164 wrote to memory of 3764 3164 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4bc3abc7de936bea8e6b8706f18bdb2e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3164 CREDAT:17410 /prefetch:22⤵PID:3764
-