Analysis

  • max time kernel
    117s
  • max time network
    129s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/09/2023, 23:46

General

  • Target

    nDhKzy1ieWlp19RtCMcxDioUexS1nJWqABCSe49Etr8ù.html

  • Size

    38KB

  • MD5

    304d7ff72db2821623801f7426270f57

  • SHA1

    38ca6594338ae46831dcce38b61bef8a758afd4d

  • SHA256

    bab8ace82283d7b82f4f4f96c80d7d70fcb42b127f2e3144ed0820837d42a6ec

  • SHA512

    c0ea1d989a8a16b5a992a4ecebb579b0531500b26a1b996f0e6881fc3e20f677ab439aa2f934f6da2494b92f8b2fc35a0256e986d29acf8462383be7efaff5e5

  • SSDEEP

    768:sXU7f/MWx/OAjx/OAE+VCPaSoorqx/OAbLVO8OhtSl:sXU7fES/DF/DE+VhoS/DbLVO8OHSl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\nDhKzy1ieWlp19RtCMcxDioUexS1nJWqABCSe49Etr8ù.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:68
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:68 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    342B

    MD5

    4de277c5311b624c2699d22864de8d75

    SHA1

    a51e0125f4ef7ec2a1699924e17525bee468e0e1

    SHA256

    3ef00b4601c100cbb1e05b9f1dba0a7e7f3133aa6e2c6fd1b8872bbeac98c6d8

    SHA512

    ec66c42b7a82030dd217eac8c4339ce40cb3cd32a60b8dbde039ec015719acbb7a350205f5e13e403b34ee92a2773ddcd01a6d39bc0cdb3d213b79da8749c2fb

  • C:\Users\Admin\AppData\Local\Temp\~DFD641FDE2CF5258A4.TMP

    Filesize

    16KB

    MD5

    0d8a2711a2d289a31767c6c48cdd157c

    SHA1

    336b0063d1279f7e648f1a2d39dd30dca0efeb74

    SHA256

    4603276170b9c4f22b374f249f7726e326bdb95a803bc90db49874e97034ad7b

    SHA512

    8fb20dd5c125583dbdc5feeed43ab72d6dac01a3c1a61b211d751a7060454a7cbab3e0df685f7567b8e6fc9bee404a6187cf2ecaca11c95482c0f69dbf574b94