Analysis

  • max time kernel
    138s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2023 22:00

General

  • Target

    index.html

  • Size

    631B

  • MD5

    99f22509a1966facd2ccd8b7b52b5a6c

  • SHA1

    d91bc81dcf8f0b518969acd74078d2fd99e2ccd2

  • SHA256

    f14efc734f1f03b9e6eafa918da4d46a19e56074454a1ccf70db113229d8a5f3

  • SHA512

    5a289ef7b231b294d3e44c98f6b62f06cd1521ff68be57d77d5fea8c2e6b2f966ba03c2193b8005b90b4b9865e904681f0569ba843744b155e6a71e2c9d67ac1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    f59a457c6a757d896155506680f2a4b3

    SHA1

    729ff9a74596409d0df20a5117c50bbfee1d53d6

    SHA256

    8fe76d55560f116cbdc82d512589ec5a122688e1d4d38a1ea6af65596156b988

    SHA512

    c0faf1a2e216ecd8ed1b7dcbefeee6101f7b443da8a944bdd311fead18e6522458aaabf1ff1ea9354d9d78e68a48132022e45cd21ae4094b17a29b746ec5f93c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    a6ce6c5ae09532447d88e87963d24405

    SHA1

    f61b637baaaef4f429f998e78885f7a6c695467e

    SHA256

    5a6aa58db22aa87c9d95bdeff5c94a4d09389d0220094fed112b5ac97881948b

    SHA512

    f197c9862653a8c22e17b9abb95aa624267670f095d9370036ce39ddf06b4ea6b8003393bbe847074a991470d9a7644ffa59b3dce8ba3eb02655005a4010ef56

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5T0U3BIO\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee