Analysis

  • max time kernel
    185s
  • max time network
    258s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/11/2023, 22:34

General

  • Target

    c300139633be547dd587d6ec31fc64d73e9ca120eb08b7e770264e41dce0f15a.html

  • Size

    542KB

  • MD5

    1c4549a7485a09127cec104d39c8fe85

  • SHA1

    f93c946b810b1eea0d35b3d4d9f72fb206e387d9

  • SHA256

    c300139633be547dd587d6ec31fc64d73e9ca120eb08b7e770264e41dce0f15a

  • SHA512

    b91386af9f23afbf52c8588d506387d3db5d90a8abed7da4d02200b6ae1eaa3f9ac8dfb595cde3949c31e01caf94e35fbf9c5dedfde9240ef5dc6554b3e981b3

  • SSDEEP

    12288:FGZ1TgcXpwXnkZi7Gyhkyr5hWxIOOQ8agM:FGZ1Ia/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c300139633be547dd587d6ec31fc64d73e9ca120eb08b7e770264e41dce0f15a.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4408 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TCMH1DO0\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XZVGCF99\docs.7965f6735e8e39fbbe73[1].css

    Filesize

    554B

    MD5

    d11928ebd8a1101a2d6b4476ad292606

    SHA1

    e369a7d65299feb97d8c11525d8c831cc463c63f

    SHA256

    7bab9c45d7c84255c431ca155530532d5ea19f30bcb389db20f7edf26a5cd43b

    SHA512

    f3999089fdd2719f70bc2999b1b282452add77eae62c4c55777ccb376bd0d0a3a738e2492301a9816df4885f2693fe47a9539a31ff47a445b2c86a1b8a6cafa1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\JTYEMPNV.cookie

    Filesize

    545B

    MD5

    92ab1ad740ee0b3bba0680248f749f0d

    SHA1

    6b642d01577d9a44aecb302318288d9b6ed9db24

    SHA256

    fd019c2471d580c1836343353122cb5f880b77e0dc39cb33f9c5f7b2cab4fc9d

    SHA512

    776b3b368f6014882e0e2761963f9c5598c9fc981221bea68821cca92732644f129de9b0ff570cc761a120c1f3f9ff36fa293b970615fd14d3bd911f11eaa0a2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\X15KKJOH.cookie

    Filesize

    543B

    MD5

    2722c295fe71e6d2f3a1dd45a267c47f

    SHA1

    e2fefc11581dad8c9e32e69a0fc0cb02e160390b

    SHA256

    938e97b575fa387b56c8c42a583589c3952cd77ad9818140a7a75f1ae7d1e75a

    SHA512

    e7bac51573043262da656696e1b8b657f7b47551e76cddd1effee9e691d8187512a69416b2b232351b5f4b42f489b6af85b678877f60be6cd10ed6956ddd69f1