Analysis

  • max time kernel
    0s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 13:46

General

  • Target

    22e7e0422f5417e879384396f7b5a4db.html

  • Size

    3.5MB

  • MD5

    22e7e0422f5417e879384396f7b5a4db

  • SHA1

    ce6458d80784d44ecfafa100bdef3ddc954c7b4d

  • SHA256

    93f0adeece77bbbe6da0d34213e9dd45e8ecc39dd3a090114d3b8015027ee5c2

  • SHA512

    7ee590b3d34ba603d18e400838926bb7340d687f7e09e96a873319c5c7906dd1c2c9e8062c96685c4ce02841f2d82a8e5ca6739fc3e8142fa2821f5b0919d918

  • SSDEEP

    12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Na+:jvpjte4tT6w+

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\22e7e0422f5417e879384396f7b5a4db.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:428
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:428 CREDAT:17410 /prefetch:2
      2⤵
        PID:2280

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verBC0C.tmp

      Filesize

      15KB

      MD5

      1a545d0052b581fbb2ab4c52133846bc

      SHA1

      62f3266a9b9925cd6d98658b92adec673cbe3dd3

      SHA256

      557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

      SHA512

      bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\jquery.min[1].js

      Filesize

      13KB

      MD5

      ab91e8f9ba34246f7059d3da92b9471d

      SHA1

      31ebed4ec9bc20ecbd746ca95e2ebf4b9a8e45f1

      SHA256

      3912435d0525c7ca0f61bf6ca7d9ba9e836ce4b7109fee65a477101c7377ca33

      SHA512

      465586e544e890a3ca7d128be31878e389057ccb3fee95ad36cf8c0f8be6bfeb655fe9dfe302d8316c65e67477c3106a3f49d43f271c047c3cde2ed066baf222

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\suggestions[1].en-US

      Filesize

      1KB

      MD5

      c6bdda3f990d9f4af799c6780b8859b4

      SHA1

      a621164f6b814af5e867c84e7b014695c850fc7e

      SHA256

      bf1d3d4bd2bfaf7e1c3ecda4669a16a68da4c2780c49c60b09d3fbc13a1633dc

      SHA512

      955019d37611587f11831068a20a8b7f2a51838d6c11d02c822aa752fc056ba1336ce2d8f1e7d338fee9b3c9b11889ab8c615a1f60183f27cb060b3976033443

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\jquery-3.1.1.min[1].js

      Filesize

      1KB

      MD5

      7c62ecfd5401ab16c0267dfc4ec0c20e

      SHA1

      0b6178fdc794500f8f92a282cdef59ce18fc50bc

      SHA256

      67e0c54b1a0e769aa3b99a373d00206b7596623535d6405d7352776081574e00

      SHA512

      c5b76c2c6483895743018da598e8673ca7c3954704e57c1ce2f2a75ff100902239a297bc13d49d3135e22535441aa7b4161472b81cb1aa263eb45ee782fc0f49