Analysis
-
max time kernel
0s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
4f8bdbe08c5b665aeb76c5f260edd4b3.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f8bdbe08c5b665aeb76c5f260edd4b3.html
Resource
win10v2004-20231215-en
General
-
Target
4f8bdbe08c5b665aeb76c5f260edd4b3.html
-
Size
3.5MB
-
MD5
4f8bdbe08c5b665aeb76c5f260edd4b3
-
SHA1
955bbaba8269b6df1504245d06394f53170b7377
-
SHA256
2c57156fa7eb6a465b69c52b77556af68e42abf686bae60bb97c8cc8b9b23207
-
SHA512
db0f0300a5aeb51651897cf525cbd9e03a058ab929c3272506d5224f93a74882535971e9bab9ea9919cca618aee689767b6351bb29ab6808459d76a3df252ecf
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NSM:jvpjte4tT64M
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{68276702-AF6E-11EE-9963-7E4216712C33} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4400 iexplore.exe 4400 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4400 wrote to memory of 4728 4400 iexplore.exe 16 PID 4400 wrote to memory of 4728 4400 iexplore.exe 16 PID 4400 wrote to memory of 4728 4400 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f8bdbe08c5b665aeb76c5f260edd4b3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4400 CREDAT:17410 /prefetch:22⤵PID:4728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
43KB
MD5d2997128b5c28f5d0c0b1a61f30617c2
SHA1d09593e26d8cfedbc956084b3fbae40465479304
SHA256447d0cba7ab9a971a85b06b321f1d4d34d440d15b93e2aa9d6272934eb02b285
SHA51249a83b60bad5f9be73b5ea512bff7824898822ddfbae03e794c2611f97284cbaae2d15a47ca0116616ed07bcb215ed04d14a3936de108a19b5d9880d970d68ab
-
Filesize
5KB
MD5d05073d141d50f3d43aad8c5c1211559
SHA168bae8b063ca964ae2d5b29a528d220f1445ea3f
SHA256b14566073c64e90b620e0271a6b8c5aec291be24f523002b3308de2002484a92
SHA5120053214a329e93eb5294bfc50956be832e9f8a9ebf5b1620780375e77e8a33351e86dfe8e91a60bd41135401d4d5b47a47dee417ce3f566c46c1757b2d0d90db
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
17KB
MD5a45a596fdb18a10029ea82607181a5da
SHA1217884d313f3a35c2e553c1b2320756aef2f190b
SHA2566045d6f216cce0f8c107276b35a7a87fb6678766351bc5bc1828e017212ad6fe
SHA51233adfce8ca79c437acaed2a78e67b115b4008169f48adf5941e33107296cf14e554eb460cece5dfa1c3be82d80e5baa80cc2e94c1cbb3aa25e4c12628ae679a4