Analysis

  • max time kernel
    1s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 13:18

General

  • Target

    212dc383d6c2b6860ba4ec916bcc943a.html

  • Size

    11KB

  • MD5

    212dc383d6c2b6860ba4ec916bcc943a

  • SHA1

    f6a8f290f9301c5d19640561a48d41e7bbf0bf33

  • SHA256

    e50bebf13d7c733645593eaf7990253965527e4dc97646daf9e86449003b2f51

  • SHA512

    bf94e3230f850d500b75edd4fd797ed35130c097ee80d13416740232183aaecfa386b3687f0f3a2b5b2d54b5cf24723ce7042f25b01e54021a994ac048422a53

  • SSDEEP

    192:2V4lIsr03zw8k/w1wvqyzB9UngN7YKt018LOXuBuLbdU8d:s4lIcuzQ/gczB9UngN7YKt08LOXguLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\212dc383d6c2b6860ba4ec916bcc943a.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4228
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4228 CREDAT:17410 /prefetch:2
      2⤵
        PID:2760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      404B

      MD5

      ec0dff208f794c70509e0c2e15d0bbda

      SHA1

      c4aac7fa184dce45e0e554a0e18de1d62c4d06f1

      SHA256

      b973640eb574f77f51c55f8eaf3159d64fb5f00735f082d0153f6264ee777085

      SHA512

      d292b268618b3a5015a18a95cd2214b3520385d89f85ccf92770ee973c4712149675cd00efb87d07df356b63594467c787894679e1e62e3df8320d26b106ddbc

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver31D9.tmp

      Filesize

      15KB

      MD5

      1a545d0052b581fbb2ab4c52133846bc

      SHA1

      62f3266a9b9925cd6d98658b92adec673cbe3dd3

      SHA256

      557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

      SHA512

      bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Q9YQXK50\suggestions[1].en-US

      Filesize

      1KB

      MD5

      c6bdda3f990d9f4af799c6780b8859b4

      SHA1

      a621164f6b814af5e867c84e7b014695c850fc7e

      SHA256

      bf1d3d4bd2bfaf7e1c3ecda4669a16a68da4c2780c49c60b09d3fbc13a1633dc

      SHA512

      955019d37611587f11831068a20a8b7f2a51838d6c11d02c822aa752fc056ba1336ce2d8f1e7d338fee9b3c9b11889ab8c615a1f60183f27cb060b3976033443