Analysis

  • max time kernel
    0s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 19:53

General

  • Target

    0f0b3917b0fe4b6fed520b4b1112ba2b.html

  • Size

    53KB

  • MD5

    0f0b3917b0fe4b6fed520b4b1112ba2b

  • SHA1

    ab742148320bb275ec8cb3f2e2089fcb2c1ed6b3

  • SHA256

    e039a3836eb38c02283591d3c16135e50cc89f18006c139447873901b1f04cb3

  • SHA512

    a199e95671925ca04f4f79053523fd4d1e902d7703da3c672b46681ff8aab1517a84c9e1ab6480f1cd37e39081ea80bf3d8409462bc69f3760b18f12d90c9992

  • SSDEEP

    1536:CkgUiIakTqGivi+PyU6runlY963Nj+q5VyvR0w2AzTICbbxoa/t9M/dNwIUTDmDf:CkgUiIakTqGivi+PyU6runlY963Nj+qd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f0b3917b0fe4b6fed520b4b1112ba2b.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3604 CREDAT:17410 /prefetch:2
      2⤵
        PID:2216

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      338B

      MD5

      d4a1db954d1341a477618328c28c6a21

      SHA1

      6e24dab42dd00d55a1712cc6ef303fe4cb5f673f

      SHA256

      70955f12706edd234030de39f0aa27ac22945af6807346feb59e975c2b1d2d24

      SHA512

      175437edcd075e7213f8d6c6519ba4b9f231ec2490566022d498d93a25f37b4f83c3d1d2cf96ac4a992aea4f326bd7a4716260cfe99f9bf0af706e0afe5e6a28

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verB517.tmp

      Filesize

      1KB

      MD5

      eb67baf06a1d94f22035da0b59a13d1d

      SHA1

      68948612d15d7eea6fbdb80371d9c7f78ff9b189

      SHA256

      428769b8aa88bd8024d80218948cd9af21332cc919bced628a7d8261aaffd800

      SHA512

      cc0f8e6fc3bb6765993e1074b4e34e8de49acb9c771635c02f3471249eaddd6c5a549cf492ebddf1af2e90d82cdb3f7a603fc0443334b9d4131ca78c50a085a3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1RIAF1U2\suggestions[1].en-US

      Filesize

      13KB

      MD5

      cc4eda7ce096d3dba1c48839ca5242d5

      SHA1

      50e017e8bf050957a6eee430cb1c753909df3858

      SHA256

      9e3ee18ebfda73c24c022dac2ce12644564d8333c3a9af1e8f6edbf22d4250bc

      SHA512

      48fdb49d14b3662ac33909ae8c249735abd0a0727c356ee4803ab2e28da7e2b0e6e4f170cdcf51bc0c6cc03ca457cdb4352d73fa76fa65ac151a9ca20606f56e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\SB302YPZ\style[1].htm

      Filesize

      706B

      MD5

      67f3a5933c17b3ab044826d3927d0ba9

      SHA1

      5957076d09bacaa6db8ddc832b4fd87ed8f05f8a

      SHA256

      97e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64

      SHA512

      03ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e