Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 14:13

General

  • Target

    00032fa18a28a48ecb17cce2f7008098.html

  • Size

    13KB

  • MD5

    00032fa18a28a48ecb17cce2f7008098

  • SHA1

    dce746547caea787249743f981d392d6b56d76c1

  • SHA256

    200e49d84bb06fd7c533a38eff98e4383160e8b013e6fafbb1688c5f80812901

  • SHA512

    9ce2e0e399b7e2a0295880ad50b47dee5eaf6cbe7c052999cbf2d338b661b217aec8e103de25099fed34d64558b910b0d0b9087fcd077a2d25c051d8014199a6

  • SSDEEP

    384:cukEcINb+C+C8GRtROqj3VYT8RXxd0B0f/CRwBpOYkdiR7pwev:mIMC980HO2xLf/CaBpZkdiR1wev

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00032fa18a28a48ecb17cce2f7008098.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5280
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5280 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    1bfe591a4fe3d91b03cdf26eaacd8f89

    SHA1

    719c37c320f518ac168c86723724891950911cea

    SHA256

    9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

    SHA512

    02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    338B

    MD5

    1db32fefd02de55e870a0d03fe80685b

    SHA1

    6ea7d977aa1ccc0ab2253f3351c6bcc43f19feae

    SHA256

    fe2f6c7d5e24694d008583b9eb6e8dbbc689b3ea7a29d8417b428e34a85299ac

    SHA512

    cdd0a0ae88f50c3f45c5b2c4a586f56213a6b6bb48b7b13657339fe877f5573943e00b474e994cd6bd50d69508d900a6c1edd16db8f1fea57963932d5e00e55a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BJCNBC62\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee