Analysis
-
max time kernel
0s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
54f0ed183c627de19f3d317c7fc0bcb9.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
54f0ed183c627de19f3d317c7fc0bcb9.html
Resource
win10v2004-20231222-en
General
-
Target
54f0ed183c627de19f3d317c7fc0bcb9.html
-
Size
247KB
-
MD5
54f0ed183c627de19f3d317c7fc0bcb9
-
SHA1
ecde1959fbcc317d06ff8ee1055854fecc57bbf9
-
SHA256
8b357a7103ef7205829bd1efef6edded06a1ed6ab4fd320a1f6e4839c57c83dd
-
SHA512
7ee04b62274e9541bca3698dbc88e0e3aa776d90fa786fd7d0de6dde952e1349c1769286000e5b342a0724914935a0b98e6f5e50633b4c563702b0cdac1eff44
-
SSDEEP
3072:StbirhB9CyHxX7Be7iAvtLPbAwuBNKifXTJd:StGz9VxLY7iAVLTBQJld
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CD4DFC7A-B0DD-11EE-A0B6-62C42074CD15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 224 iexplore.exe 224 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 224 wrote to memory of 4612 224 iexplore.exe 17 PID 224 wrote to memory of 4612 224 iexplore.exe 17 PID 224 wrote to memory of 4612 224 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\54f0ed183c627de19f3d317c7fc0bcb9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:224 CREDAT:17410 /prefetch:22⤵PID:4612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD59e8984ea88f32dcb9794046e037fb502
SHA13bd419d5d7de9b26a084ff24956504906cef4c79
SHA256a9a4d60c91d25e2d791bcce9bd46be9ba6ea37d2c355285eb58c389a3368e81f
SHA512496cd15429228baa0599582db48b439d0df435eacdb7379d99a66714d56a9f2dc789c3b1e61408abc9bfb0514b50a22c835dd4c655a0622b638b375e6efb97ec