Analysis

  • max time kernel
    135s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 16:12

General

  • Target

    JJSploit.html

  • Size

    14KB

  • MD5

    dc685e5c6a0ecf023df9139a56fedd78

  • SHA1

    fd1ed51714754aae8d4f493009f931fd97e1d493

  • SHA256

    eb041cfa697c180251290f41ecf4493680f16dea6b579839b8230a5a69dd7b71

  • SHA512

    b87465e540b51bd614e0e43a398bc34addac924602b07f35cba6e5acdd3d9870aaf695bb865f6eb016c6ca69db65e58e70d6dd42923746de93cf7b8f28e1d3b7

  • SSDEEP

    384:Qd9TilUdvC+QUeUIOUeUmSEi/Li01UOUTVxWApJWDWigqWia03StSimSiYSiB7A4:QLTilUlC9fvOflS5/u01/8xWApJingqg

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JJSploit.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    8e225693e0f5e0fe87b6c0651cc02e7b

    SHA1

    26f2699564942c92abc40938ddebbe3ee752a044

    SHA256

    d4d434f4c320c2628b270061249396b5897cd93387353aaa36c8324442c3e05f

    SHA512

    e81e1612829fc792d4c9f7b015c052b6bd3e384f7301fcbf7eb485fb8b94d2d16fd152034253ec74f9d0578eb5c669a607a0c1b8ef007fb5f5263ac9078e220b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    ab3b9adefcda3e985c9f9bfff67d26f8

    SHA1

    3f32f4cdaa71f69bb2eb1f547a1cccd85a95880d

    SHA256

    e6c4e3af36aeeac73818d86d5ff03c1f1fffbd1360d3454a1672cbcd1046207d

    SHA512

    3781743ccba3cfcd95c968aeaf012b727e8e9e16be54efce98581ca8519bb036706dbc2036d0748bc60a3afb18c9edf3616cee559f9b35955c8058cc6e3a1298

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1QD0OQIU\f[1].txt

    Filesize

    171KB

    MD5

    0b0e289a5cb2b3d409122109252aecbf

    SHA1

    a6837cc67c5ab412cd4c81947bbc2a6880ddfd4f

    SHA256

    5dab3c355541089e6b4df9b30d378abb724d47736015effc1b365bb581120c8e

    SHA512

    0e38911c30aef307ebc3952395afec2401e9fbc413efe6cdb4cecf8d2c125ea0bd9c3ed6dedd6ccf524ed4a2bc50ea1fca4e33bbeafca7483b0a8529c8c0f6e3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7H3JZN74\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee