Analysis

  • max time kernel
    0s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 21:53

General

  • Target

    13f69b965836ab02f0cef2b2677d5958.html

  • Size

    15KB

  • MD5

    13f69b965836ab02f0cef2b2677d5958

  • SHA1

    6e71318d1dd2e13c9a9b0e37574baf3ba8e37900

  • SHA256

    6e1eace6aefb96d9490fc892ca871696495905660a99164aab4f7d8257a344c2

  • SHA512

    ff7ff30281adc03f41e0db53e7bc223a136d5d0ce313f1812e87ab358a4f8fd899121ef10320b1cfee03ef609cbe7ae04b675b6e51d544bb55cbb13877fd9adf

  • SSDEEP

    384:c5HBzQGlImDr+WhQ7jwj4j2j2jWjqjOj8jUjljhjwjrjVj4DjHjkjCjHjTjFj+j+:fjwj4j2j2jWjqjOj8jUjljhjwjrjVjmF

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13f69b965836ab02f0cef2b2677d5958.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3440 CREDAT:17410 /prefetch:2
      2⤵
        PID:1384

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verB5E2.tmp

            Filesize

            15KB

            MD5

            1a545d0052b581fbb2ab4c52133846bc

            SHA1

            62f3266a9b9925cd6d98658b92adec673cbe3dd3

            SHA256

            557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

            SHA512

            bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PZ64U2GI\px[1].js

            Filesize

            346B

            MD5

            f84f931c0dd37448e03f0dabf4e4ca9f

            SHA1

            9c2c50edcf576453ccc07bf65668bd23c76e8663

            SHA256

            5c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584

            SHA512

            afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Q15AV1NQ\suggestions[1].en-US

            Filesize

            2KB

            MD5

            30df7f788dba2378218f802f5092cf6d

            SHA1

            1a9f67d4207f2e860427a53588f603a1e7ed192a

            SHA256

            79a26e12bde6ea55dbc962d136bb2887d8f805d261a19f03acacb1c9f15a9b96

            SHA512

            fedd973e1b0eb57765eace06b860fb6887555392529fb7c642b5f10fccb22cd903be7577244634c7e56df5a68e5d73e7fe5d86048b47db6587e0f28818acf2b8