Analysis
-
max time kernel
0s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
4d2e84a630ed03601a6a01a64bde52d2.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d2e84a630ed03601a6a01a64bde52d2.html
Resource
win10v2004-20231222-en
General
-
Target
4d2e84a630ed03601a6a01a64bde52d2.html
-
Size
432B
-
MD5
4d2e84a630ed03601a6a01a64bde52d2
-
SHA1
28a86e31eca6dd2d576cbf34538f36a2cfcb18b9
-
SHA256
892fb8f990f4375172d4aab821608bb6db245f8efb64ff5527a8a4c6788d0c3b
-
SHA512
697c71e59ca70b7178c17cf9be51f4ca9c6ac598b4f533e3a6ea70c7bbca05e0399012625c53d9a34a82e1b1f45fe51cb3d57400e40cfc86a0389fc3a0f8b1f3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{709F9143-AE9C-11EE-A0B6-DAD4CCDE76B8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1404 iexplore.exe 1404 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1404 wrote to memory of 64 1404 iexplore.exe 15 PID 1404 wrote to memory of 64 1404 iexplore.exe 15 PID 1404 wrote to memory of 64 1404 iexplore.exe 15
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d2e84a630ed03601a6a01a64bde52d2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1404 CREDAT:17410 /prefetch:22⤵PID:64
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c