Analysis
-
max time kernel
0s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
4f8963d88a91ac96442ef4af0ff320a4.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f8963d88a91ac96442ef4af0ff320a4.html
Resource
win10v2004-20231215-en
General
-
Target
4f8963d88a91ac96442ef4af0ff320a4.html
-
Size
3.5MB
-
MD5
4f8963d88a91ac96442ef4af0ff320a4
-
SHA1
a530bffcb6e489d5a916fc73d3aaf2784286640c
-
SHA256
2c635d60b5d3e3d57e9741d48223469aae3a96c0db30f16967aac2741d2fe781
-
SHA512
dbfc3b40a7f09dcfafab0f917cea55261cdd922ba34e462d21abbc3ca318b01cb29966da2532d01a5d428758b15dd93d83b2904af9d34acc3c2042b6dc7693a5
-
SSDEEP
12288:oLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nfw:ovpjte4tT6Nw
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CD34C759-AF6D-11EE-9963-F21AB124C203} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 988 iexplore.exe 988 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 988 wrote to memory of 3052 988 iexplore.exe 16 PID 988 wrote to memory of 3052 988 iexplore.exe 16 PID 988 wrote to memory of 3052 988 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f8963d88a91ac96442ef4af0ff320a4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:988 CREDAT:17410 /prefetch:22⤵PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
33KB
MD5c8bb1e96382686bb9c4c0b64c38f9c59
SHA10e5a8851b7b3b001687cc38712f10a563222e478
SHA256cf207eed3022454951649d551377f811b40b3a25c5a1de778ecaf8d2a53c53f3
SHA512f2a2afe95a1b3b937524ab848ccee9c79cd313c9ab9c9686a31dd723ea36aebbe4a1ce8fd1e2377f505e618a2765b119a64d2b20001257283af068d0fd5b8733
-
Filesize
5KB
MD5f87c6a0c6eff1325d67b61c47d228b40
SHA14e01fd7c44930f8843b2ea102367aec052e017ff
SHA256871a41d14f44431776afd68366b2e549e1204a296c36686676cef6b4c3a04e0e
SHA51263f9c144c3c47568e2ef3ae11533215ccabc3ae58ed277aa311136d998e9436221334dabedf9e619ab2409eb820017766193d264a6065526c26f01b0b424f741
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
19KB
MD5dd1d068fdb5fe90b6c05a5b3940e088c
SHA10d96f9df8772633a9df4c81cf323a4ef8998ba59
SHA2566153d13804862b0fc1c016cf1129f34cb7c6185f2cf4bf1a3a862eecdab50101
SHA5127aea051a8c2195a2ea5ec3d6438f2a4a4052085b370cf4728b056edc58d1f7a70c3f1f85afe82959184869f707c2ac02a964b8d9166122e74ebc423e0a47fa30