Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 02:36
Static task
static1
Behavioral task
behavioral1
Sample
5be941e990b88fdfee7494a40d374e6f.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5be941e990b88fdfee7494a40d374e6f.html
Resource
win10v2004-20231222-en
General
-
Target
5be941e990b88fdfee7494a40d374e6f.html
-
Size
430B
-
MD5
5be941e990b88fdfee7494a40d374e6f
-
SHA1
b5e6330d95dc4bfe455c2a8b4c8acbca9a1a83f4
-
SHA256
10681804c05f7e3a9221d675acb863cb347a2b0d577b72fdd2a580ee6a5440a1
-
SHA512
5fd3cb867b54d4df9f195fec22b896122e438588355417946a651e8193a62a32dfcd767f429bc0e057c2707377d60d651710e73e7515879f776dd9588a8f349b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D8E956CF-B34E-11EE-A0B6-5A0B45D0E1CE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2708 wrote to memory of 4508 2708 iexplore.exe 18 PID 2708 wrote to memory of 4508 2708 iexplore.exe 18 PID 2708 wrote to memory of 4508 2708 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5be941e990b88fdfee7494a40d374e6f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:17410 /prefetch:22⤵PID:4508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD571d362b16fce3a189576b3dc6dd7098d
SHA1a7562c374639f988f97f981a6b7931f1d36275c3
SHA256d495f0b16a60f2fe1c85830a4fe79b7b35b364a024b3c706715eeb3ad6226c21
SHA512a3835ff0da7862047d1b0d5622105c2a71710e05312c20182a51b1795eb250e5cce31b64c09d862a7d335edc75da7cf4fa2ecb7ad53170dc5938164978b013d2
-
Filesize
1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee