Analysis

  • max time kernel
    218s
  • max time network
    229s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-12-2023 05:06

General

  • Target

    9c2c5322256c759618e92879118354ba2726f1545bec7f7017d0b54a88139186.html

  • Size

    396KB

  • MD5

    36f6d18d3cb67dbc61f6441af878ff62

  • SHA1

    3528ecee57f96871a0e4e57c965d6d3e839dbca5

  • SHA256

    9c2c5322256c759618e92879118354ba2726f1545bec7f7017d0b54a88139186

  • SHA512

    d509421899740679ab7221c0ea163ee4d878041e8dd225eb6cd560aa8af1c049845e759a8291d20c5fc451c87adac7561edc6b66fa6b1544d280035af6a0ccc6

  • SSDEEP

    12288:POM1TgcXpwXnkZi7Gyhkyr5hWxIOOQGecJ:POM1qeA

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:82945 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1408
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9c2c5322256c759618e92879118354ba2726f1545bec7f7017d0b54a88139186.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    1b0a195c9f74b54a7f21c1929d4c54e5

    SHA1

    e15790f0a348ad2429f3348cd0f34b1312ac22dd

    SHA256

    dff3b61e66ef9e3e08cca4274b95790fdffc1104e185d43fedec612a90c4ebb9

    SHA512

    d6d2b526934466098d110e83b079cd48d2173d1fcb941a89a45f4b58e8cad6fc94104a61392411ade30fee0defa621c91f8e2965e25c16ef7521fcd08053c3ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    a710741fbc378ff4b1a9193a47e112c3

    SHA1

    032c2f93fc6dd240bc17bf22b58452fdb2a13d92

    SHA256

    6e5c97537315548a10bcf8dccf253825bfa4c958416330b5dbef3645bdfa1781

    SHA512

    645006bc7b3ad064e045d2bf94d66dda1ef615e06cfa4e753f944b8d8457bf5bd255ff517f4d39eb2213ba875389b5839319fe5db5c0fef527e8b585cf60f9b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver37C4.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0M3DYS27\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\73QB9ZZL\likes.43d06ff5b2b2908117f7[1].css

    Filesize

    422B

    MD5

    cfecb8ef6e9c75e4a39397dd3bec8438

    SHA1

    d6be820385c161cad93de0b73d37528dd1c960dc

    SHA256

    b81eb89bd6746d7dd93586ea983ac075bd6d7e2dde632a7c722d5f9eb5301233

    SHA512

    a726490a3765408166e183c62c0eff587478a94ea00ff72bc959ff9ed37a1cbdb5d0f7fae53b7c894e3e402cbc889cdd1f4b07aa5b4c9c8320922d7ec07d6f23

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\JIO0HB7G.cookie

    Filesize

    540B

    MD5

    714254b4ecca713d77d5c01475cd64cb

    SHA1

    ea257c2801d8d2a6c2c25f40324df9924eb21406

    SHA256

    8f0dbfbb2054ae7ca540eeaba9b8a2ba531951bc09455a98ac44f4d60ec78dfc

    SHA512

    3a1a8903f6eb5d0528b35c99c3e66a336da18de9a35414eb5902a8f8bcb2d2cb7b9cf3252298a4df1cedea9228422b6bc5658e03cc953fe18defe3c7db75e303

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\WELF70EM.cookie

    Filesize

    174B

    MD5

    e921473c0257ee0ac6ec79e282892bb4

    SHA1

    9261288b9a1f8f5fe5382c026268d7e0cc134f08

    SHA256

    58f35b112a75d268c0d0a7e4e95b7c4d2a047df157eb9b228f276e40da364893

    SHA512

    dbe3b7c5a41b432c219a6ff03aaccfa66e404cd18a8f78e535c3b53fa01c8a3cda2c41221e48789c86aa4e12c043247451a36fdc389a5c3acfbf031eca605f9b

  • C:\Users\Admin\AppData\Local\Temp\KnoD5BF.tmp

    Filesize

    88KB

    MD5

    002d5646771d31d1e7c57990cc020150

    SHA1

    a28ec731f9106c252f313cca349a68ef94ee3de9

    SHA256

    1e2e25bf730ff20c89d57aa38f7f34be7690820e8279b20127d0014dd27b743f

    SHA512

    689e90e7d83eef054a168b98ba2b8d05ab6ff8564e199d4089215ad3fe33440908e687aa9ad7d94468f9f57a4cc19842d53a9cd2f17758bdadf0503df63629c6