Analysis

  • max time kernel
    0s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 08:27

General

  • Target

    11f2554f56796ae09f45f3638e428319.html

  • Size

    3.5MB

  • MD5

    11f2554f56796ae09f45f3638e428319

  • SHA1

    e26cc7e5117acdbf594a59086003e8b3e4c5cafc

  • SHA256

    6c02eb9f605bc04f860704166ec526298c1a2d408b70ec30d034988d0cf7af8e

  • SHA512

    27efea1f6d04135359a527f641a50c467cbacfe0ae314de21a5098b7bff121b55376d1f56f461fe2592c07a87307976ab4bd9c5200fb10bf8f99e78595752d52

  • SSDEEP

    12288:jLZhBE6ffVfitmg11tmg1P16bf7axluxOT6NAG:jvQjte4tT62G

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11f2554f56796ae09f45f3638e428319.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:17410 /prefetch:2
      2⤵
        PID:4924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BJCNBC62\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\jquery.min[1].js

      Filesize

      5KB

      MD5

      c200aba7240c351a23a1d7d53c4ae303

      SHA1

      ae829f3c38b3886429730018ce5695ced5a67b39

      SHA256

      e90cb723124aea49967b5709c204fd6e6e4cee855b49c05a7c26ae055e739c08

      SHA512

      f5df3b3c9b6fc9245408499646c90e87761a1ff9d1a48496ed4e2f0bc3984c88d140595a83371aa4a85b7945eae4dd16966225e1ea0cf8e1fca0b5eacb112eb5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\jquery-3.1.1.min[1].js

      Filesize

      5KB

      MD5

      7bca1b1e011eb303e14b20203ea7f36e

      SHA1

      0cde285bf1d49d4e8b2398c1e1002a065dea3191

      SHA256

      6d9bab282c1afddbe4eafe439f9717604c02f3e6a0820defcef196d9c191fcf8

      SHA512

      25f568339609bbac4ba60562bdf48034fa787e8b084ffa4a6b58a036d8158b9d7f83a53dd19b96ff9bcfc4b2106c6e43feed76845e91227047426df55afb435a