Analysis

  • max time kernel
    128s
  • max time network
    262s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    26-11-2023 07:18

General

  • Target

    45e027e5-1183-4601-b7fc-913399630134.html

  • Size

    315B

  • MD5

    a34ac19f4afae63adc5d2f7bc970c07f

  • SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

  • SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

  • SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45e027e5-1183-4601-b7fc-913399630134.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3496 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    3cee4923e5ceaecc5ba34995ef8e3bd4

    SHA1

    2a788bd9839f2f292936bab45170d0baed6ce629

    SHA256

    1a0273ee7c70e0e9d1d2787652aa747790dde370920a204965a00a8cb607f593

    SHA512

    0e42cd886987c85f3a2b09c9cc8ab2102fc6d2bca54a9c25581b6c74577c73668184e67ddaea05ead50cc65502790274f9a7a84ee47fd6a7b959ad65dffb5d7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    09eb59abaabcabc478ef095e6ee9201e

    SHA1

    8701dfc3e125471c64132a7bbec6949f29e87f41

    SHA256

    560076922791fe86291849f7a1a526da266ec37d8111bdf7d9e545cd887abcc0

    SHA512

    1102b47c3db12c184d207ba9737b38f8c55b475d452ac331174c5df5d750d9f1d542014207914c902e0730d4c722e5efa098c022c70a2096e4d1522919aa4ef4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PVJSO5VT\suggestions[1].de-DE

    Filesize

    18KB

    MD5

    cc5361b5fdccfc6830217e2eb9972dd8

    SHA1

    e4a1206d9190eccea3e6a116c954d11da0aeba66

    SHA256

    afd57b0b6d8166e25bbef7cbc97522677c11c9a930fd4d4a204d1b7ae6258492

    SHA512

    ef63961bd7f0d3357d352a8f9c8ea57d0271e0fb664b1be179c38cd2d559bbaa4864f64f3521f26f868cc074f97994e2658c6d652021a39dc5207d45411691bc