Analysis
-
max time kernel
0s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
5126dc16f1789e5ba27a358973714f21.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5126dc16f1789e5ba27a358973714f21.html
Resource
win10v2004-20231222-en
General
-
Target
5126dc16f1789e5ba27a358973714f21.html
-
Size
58KB
-
MD5
5126dc16f1789e5ba27a358973714f21
-
SHA1
9e6b7e74b58b19d58ee9cd165faa83aa4a17a451
-
SHA256
dc36fad8fa50ed71615205bf7593979e5dc39946453349f2327bd3c52f049ed5
-
SHA512
ecf01e96fd5a57a9ceabba7fc08e0797c91e5a1ce1d2e91c201d9a96b5e97ab8bd2cedb6eae9c640d96aeb287dca11ca09ca644af97ded37636ef7fcecfba326
-
SSDEEP
1536:gQZBCCOdE0IxCdKRHfJfJf3frfcf+fQfefOfOfAfHfgfjfqfXfpfCfmfxfmfRf1b:gk2i0Ix5hRvj0Go2mmYPo7iPhK+5e5db
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{773D3128-AFDC-11EE-A0B6-6AA3E029E500} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2172 wrote to memory of 4308 2172 iexplore.exe 14 PID 2172 wrote to memory of 4308 2172 iexplore.exe 14 PID 2172 wrote to memory of 4308 2172 iexplore.exe 14
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5126dc16f1789e5ba27a358973714f21.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:17410 /prefetch:22⤵PID:4308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
1KB
MD5291a99e74dffdffd590c0dfd5d0be362
SHA11fe93d12f8a289915e2e58678815d98e1978467d
SHA25618d9dd3e52997fdc28af876564d296442313194d21c9f06d47e677fc9ea538db
SHA512d010b1b147e33f5dbc9aa1b8cb4f849d5859c8e2129ad0b8baeac82d84fd00c075456fe0ffd857dcdfb90c76dbdfa0ddaecfbb8dd3c64ebb5bb76d6eb2fc915b
-
Filesize
650B
MD5ea5a5798612df63ab0532174aaf62634
SHA10f4713eef39ab07510d3703ef201885475ef0b42
SHA256ee44a690e6d7ba27656d9a013b7803d69461a19444d834c918d16c1c56598a31
SHA5128cfd3dc5eb7f2ab4f27abf80bea6955a00112b84ba074cfb8a1bce0207c36f6f12e2f3e90b8ebb8fedd56a5520a4a0d09397af9e6f4885addd890df7bf3b8907
-
Filesize
2KB
MD5cb546f0ce2ca2505cbc9088d8a4592e5
SHA1d87b70b1a34f4313d085de80da3aa4e8845af904
SHA2560c3851f8f6d7b9dc63645a68b0db991edc9162620b9d757684a4a20206c458fb
SHA512b6fcd078f43082daf299a49646280ac3a30b91d10dcfaf8e9fb9e8317af417e34d45ae7397af9507d4101b7bcc58169c2f64adcaa253fc08204b98020b20b551
-
Filesize
502KB
MD537c6af40dd48a63fcc1be84eaaf44f05
SHA11d708ace806d9e78a21f2a5f89424372e249f718
SHA256daf20b4dbc2ee9cc700e99c7be570105ecaf649d9c044adb62a2098cf4662d24
SHA512a159bf35fc7f6efdbe911b2f24019dca5907db8cf9ba516bf18e3a228009055bcd9b26a3486823d56eacc391a3e0cc4ae917607bd95a3ad2f02676430de03e07
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee