Analysis
-
max time kernel
0s -
max time network
77s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
4e56ea95a9601976683c54104cf8824f.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e56ea95a9601976683c54104cf8824f.html
Resource
win10v2004-20231222-en
General
-
Target
4e56ea95a9601976683c54104cf8824f.html
-
Size
179KB
-
MD5
4e56ea95a9601976683c54104cf8824f
-
SHA1
f62958eafd8f483971be00a0b2c58a4d085bd20f
-
SHA256
3fa07f8abb99c4f96ce18791153f2360311ed710e2b72707500c0e6e7b93eec7
-
SHA512
3a390aeb742a34dd9503ea5e223a04d7d41ae8a73e6f3a4de78fa1fe3053877e08f6ee8b630f8d57523d09efb34d9aa802ad74119c25c43006ba32e0323b85b2
-
SSDEEP
1536:/f9qcGs7ePJKpBaoAQWb9gWVQ4MDY8RRTRf/qXIewIoAK9gr2q8hs3qrmbjwEY:XfGs7eApBao3Wb9gWVQ4MDY8IwJMqMwV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2605A8D1-AEED-11EE-A0B6-6AA3E029E500} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3600 iexplore.exe 3600 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3600 wrote to memory of 2680 3600 iexplore.exe 16 PID 3600 wrote to memory of 2680 3600 iexplore.exe 16 PID 3600 wrote to memory of 2680 3600 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e56ea95a9601976683c54104cf8824f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3600 CREDAT:17410 /prefetch:22⤵PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5c0e952fd17b107f9f1abe6a1aa9fca07
SHA13cb1242f33dc6d66668923ee5a4c41bf807bc181
SHA256c55cd5fcb0031dcf1a53954c61b1634b94ef5238025eda7869f0c3b3793b0cd5
SHA51293844985c6e8d9f5f8294383808da4d07b2a6d4363014f1c4504ca3b0881111c3db8ea00f087a96932fe9b3592c1e4b8399ad0f1ff36c7093710d2e1f1933e27