iexplore.exe
- File Path:
C:\Program Files (x86)\Internet Explorer\iexplore.exe
- Description: Internet Explorer
Screenshot
Hashes
Type | Hash |
---|---|
MD5 | 2E414291458B49ACDA42C80A4C10DE7E |
SHA1 | 6BD522A0F1B3F5C11E8E33C5062C45DD6E402113 |
SHA256 | E582676EC900249B408AB4E37976AE8C443635A7DA77755DAF6F896A172856A3 |
SHA384 | 57056D11FAF2B69BF8A7ED122AA8DAB84306D9EF0AC5014C40F01FB6385062ADC8CD4A62BEDE6E24EE7E4F999F15A06F |
SHA512 | 3CF0C8F829EC04F8E5A9B8A2B551D1764933771903A0F40D5AEF5BF7023CA5CDBD2F7084C46F6EDA98695763346338C564D010E2BDA6FB5F5A9B0C44627BF314 |
SSDEEP | 24576:dqqlGLbMMHMMMvMMZMMMKzb6XmMMMiMMMz8JMMHMMM6MMZMMMeXNMMzMMMUMMVMl:QMMHMMMvMMZMMMlmMMMiMMMYJMMHMMMP |
IMP | 27B75923177DBF055202FF3CFC4082E0 |
PESHA1 | 8187B16CD5B1B3E4E1E89F8B4B5F904D45E96268 |
PE256 | 71145DE5C265B21C9BCC66DA8D21F608BA64D3343A44FD49CFB9E4F9606B050B |
Runtime Data
Child Processes:
iexplore.exe
Loaded Modules:
Path |
---|
C:\Program Files (x86)\Internet Explorer\iexplore.exe |
C:\Windows\SYSTEM32\ntdll.dll |
C:\Windows\System32\wow64.dll |
C:\Windows\System32\wow64cpu.dll |
C:\Windows\System32\wow64win.dll |
Signature
- Status: Signature verified.
- Serial:
330000023241FB59996DCC4DFF000000000232
- Thumbprint:
FF82BC38E1DA5E596DF374C53E3617F7EDA36B06
- Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: IEXPLORE.EXE.MUI
- Product Name: Internet Explorer
- Company Name: Microsoft Corporation
- File Version: 11.00.19041.1 (WinBuild.160101.0800)
- Product Version: 11.00.19041.1
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
- Machine Type: 32-bit
File Scan
- VirusTotal Detections: 0/65
- VirusTotal Link: https://www.virustotal.com/gui/file/e582676ec900249b408ab4e37976ae8c443635a7da77755daf6f896a172856a3/detection/
File Similarity (ssdeep match)
Possible Misuse
The following table contains possible examples of iexplore.exe
being misused. While iexplore.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | sysmon_suspicious_remote_thread.yml | - '\iexplore.exe' |
DRL 1.0 |
sigma | dns_query_win_susp_ipify.yml | - \iexplore.exe |
DRL 1.0 |
sigma | image_load_abusing_azure_browser_sso.yml | - '\iexplore.exe' |
DRL 1.0 |
sigma | proc_creation_win_exploit_cve_2019_1388.yml | Image\|endswith: '\iexplore.exe' |
DRL 1.0 |
sigma | proc_creation_win_run_executable_invalid_extension.yml | ParentImage\|endswith: ':\Program Files\Internet Explorer\iexplore.exe' |
DRL 1.0 |
sigma | proc_creation_win_susp_powershell_parent_process.yml | - '\iexplore.exe' |
DRL 1.0 |
sigma | sysmon_dcom_iertutil_dll_hijack.yml | Image\|endswith: '\Internet Explorer\iexplore.exe' |
DRL 1.0 |
malware-ioc | rtm | IExplore |
© ESET 2014-2018 |
malware-ioc | rtm | iexplore.exe |
© ESET 2014-2018 |
atomic-red-team | T1134.004.md | Upon execution, “Process C:\Program Files\Internet Explorer\iexplore.exe is spawned with pid ####” will be displayed and | MIT License. © 2018 Red Canary |
atomic-red-team | T1134.004.md | | spawnto_process_path | Path of the process to spawn | Path | C:\Program Files\Internet Explorer\iexplore.exe| | MIT License. © 2018 Red Canary |
atomic-red-team | T1134.004.md | | spawnto_process_name | Name of the process to spawn | String | iexplore| | MIT License. © 2018 Red Canary |
signature-base | apt_apt30_backspace.yar | $s10 = “iexplore.” ascii | CC BY-NC 4.0 |
signature-base | apt_apt30_backspace.yar | $s8 = “iexplore.” fullword ascii | CC BY-NC 4.0 |
signature-base | apt_apt30_backspace.yar | $s1 = “iexplore.exe” fullword ascii | CC BY-NC 4.0 |
signature-base | apt_bronze_butler.yar | $s4 = “iexplore.exe” ascii fullword | CC BY-NC 4.0 |
signature-base | apt_eternalblue_non_wannacry.yar | $s1 = “\Program Files\Internet Explorer\iexplore.exe” fullword ascii | CC BY-NC 4.0 |
signature-base | apt_unit78020_malware.yar | $s1 = “%ProgramFiles%\Internet Explorer\iexplore.exe” fullword ascii | CC BY-NC 4.0 |
signature-base | crime_dexter_trojan.yar | $s3 = “\Internet Explorer\iexplore.exe” fullword wide | CC BY-NC 4.0 |
signature-base | generic_anomalies.yar | description = “Detects uncommon file size of iexplore.exe” | CC BY-NC 4.0 |
signature-base | generic_anomalies.yar | and filename == “iexplore.exe” | CC BY-NC 4.0 |
signature-base | gen_malware_set_qa.yar | $s5 = “\Internet Explorer\iexplore.exe” fullword ascii | CC BY-NC 4.0 |
signature-base | thor-hacktools.yar | $s5 = “!&start iexplore http://www.crsky.com/soft/4818.html)” fullword ascii | CC BY-NC 4.0 |
signature-base | thor_inverse_matches.yar | description = “Abnormal iexplore.exe - typical strings not found in file” | CC BY-NC 4.0 |
signature-base | thor_inverse_matches.yar | $win2003_win7_u1 = “IEXPLORE.EXE” wide nocase | CC BY-NC 4.0 |
signature-base | thor_inverse_matches.yar | filename == “iexplore.exe” | CC BY-NC 4.0 |
MIT License. Copyright (c) 2020-2021 Strontic.