Analysis

  • max time kernel
    129s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 01:27

General

  • Target

    20727505eeca9449ad218b55be58debb.html

  • Size

    60KB

  • MD5

    20727505eeca9449ad218b55be58debb

  • SHA1

    683e82be91b22b48a6f1abb26296b3275a5f5bd3

  • SHA256

    62fbf835361ef7a7b65da554cddb861941ef5e874bb2e7ba56365e1b46ee1b04

  • SHA512

    690833e5dbd8175f5cdf63b7788ef9f5704638778790af437f08691f602275d27c8eaea05deb2d17c00acea4a3ef1522b3fdc45bda7887285b86ce97b44c72bd

  • SSDEEP

    1536:f9qjkcwNSbIq77M1au9HyAP/4+LJKZ2Rae:FqjkcZ+LJKZ2H

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\20727505eeca9449ad218b55be58debb.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4464
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4464 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\LFCAPPSC\www.goettlich-salomon[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\WCQ5J53Q\www.youtube[1].xml

    Filesize

    17B

    MD5

    3ff4d575d1d04c3b54f67a6310f2fc95

    SHA1

    1308937c1a46e6c331d5456bcd4b2182dc444040

    SHA256

    021a5868b6c9e8beba07848ba30586c693f87ac02ee2ccaa0f26b7163c0c6b44

    SHA512

    2b26501c4bf86ed66e941735c49ac445d683ad49ed94c5d87cc96228081ae2c8f4a8f44a2a5276b9f4b0962decfce6b9eeee38e42262ce8d865d5df0df7ec3d6

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\WCQ5J53Q\www.youtube[1].xml

    Filesize

    578B

    MD5

    ac10dc6bb3082d8bce9808501aa2068b

    SHA1

    d56f815d527ba0c8d27931584beae6098d549e4c

    SHA256

    330bc3b81127697773eb0766240b772f22c6391fa05c73f6ee9bd80938ca8848

    SHA512

    36ee35ec00cf27b4b8552843ed15d366eb593c403206177e9f75300f8c9e422c467e349026ca55326ec1fe68897b0ae2174807c39dcc52c1b95923a90a18fa48

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BUOTXRX9\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\J6M39GIU\jquery[1].js

    Filesize

    94KB

    MD5

    49edccea2e7ba985cadc9ba0531cbed1

    SHA1

    f8747f8ee704d9af31d0950015e01d3f9635b070

    SHA256

    1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df

    SHA512

    f766df685b673657bdf57551354c149be2024385102854d2ca351e976684bb88361eae848f11f714e6e5973c061440831ea6f5be995b89fd5bd2d4559a0dc4a6