Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 16:45

General

  • Target

    06712ed19b1802a7605561a391206aa8.html

  • Size

    3.5MB

  • MD5

    06712ed19b1802a7605561a391206aa8

  • SHA1

    d14ab66ec44e8a52518801bcb9afe91b7d83b0b9

  • SHA256

    c17c347725b6b97c1f18915a6caf5e0d8380722e50522742fe727e0680d2f6e5

  • SHA512

    9c3d5147b60870022e81978d45cbe142ecf71be715da94512c8342cf3c09e382b99e99c32ae5ab584c26e2ff4681e6817bd9ca670c9d30eb9c3add6ca271b198

  • SSDEEP

    12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nao:jvpjte4tT6wo

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06712ed19b1802a7605561a391206aa8.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1308 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1268

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\SB302YPZ\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UG0DPB4T\jquery-3.1.1.min[1].js

          Filesize

          68KB

          MD5

          e8a56d3dd2d5f20a28b9c2c610f49380

          SHA1

          5cdd8374162da0c2f3046dd43da3764e1e0ffe63

          SHA256

          521a52b97ef9b1256fcaa100c7c66b232c4bc79e17fb5f8d99e9bdb13cb5eb4b

          SHA512

          ac536036606ed1d207286fc03ec13edf5378130e3e01c5dad801d905c1bbd5ea9e7c7a275b6ca4b5bd52f33e03fcd0a6397c42a7dc83d2208c9ffbb3236689de

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W8BIYKF7\jquery.min[1].js

          Filesize

          57KB

          MD5

          98d9e1d70572d1a434497c63bc6fa33b

          SHA1

          4becf06742241110c38c3f28605eacfe0de34414

          SHA256

          04f5365f4e5014310d71bf39bdef6ae587761459e76f4f9af4a038387601aa7b

          SHA512

          7d6e003a39407661ab096edc94ac5581c07eda817d51c42345745ba7692f8815c34854bb81a4f41215e192820885f1b743f8302d943e3be6a9fdb3602ecbbafd