Analysis
-
max time kernel
0s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
4c2f5da68f330b1083d4e7429c42abd9.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c2f5da68f330b1083d4e7429c42abd9.html
Resource
win10v2004-20231222-en
General
-
Target
4c2f5da68f330b1083d4e7429c42abd9.html
-
Size
58KB
-
MD5
4c2f5da68f330b1083d4e7429c42abd9
-
SHA1
f48bed13087cc63a32696763eafb9f2d1691e676
-
SHA256
b059101f08e4ff5fa5ac06685073446c3f30d976de9cc4632d093c18e53ace6b
-
SHA512
7f1b01de1ee8032d19de76565fea8e387abe44432cd08cf0a8d65e2187756b4924537c647e5437846033a52e3c3b1c72f6a3b41972edde576d9bb4edf8d490c9
-
SSDEEP
1536:/m/nbiYnZKWr4nTrpBqBvGZs3R9aeVUDDkSZAJfyQX+fQZ4B:Ibi4F43pBjZs3RkZAJKQX+fzB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{11E270E3-AE56-11EE-A0B6-766E2D171A79} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 184 iexplore.exe 184 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 184 wrote to memory of 4336 184 iexplore.exe 19 PID 184 wrote to memory of 4336 184 iexplore.exe 19 PID 184 wrote to memory of 4336 184 iexplore.exe 19
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c2f5da68f330b1083d4e7429c42abd9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:184 CREDAT:17410 /prefetch:22⤵PID:4336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD532bc41d964faa1b95d9c61fc443df579
SHA102d3f83dac14fe996babbfe332779ed182d39d1c
SHA256369ae154eab37b7ada7776b934833183bb053ebd1d0255f70ef8944f65cabb0c
SHA51245539d5a40bf03b25c6f4328c0d10bf62a1012ff9be634877d62ec8a7ff35b25dd6cdc0fdfd5fcae2e3d980b6e4ba653b259c099935d52a20e8b6581cce521d5