Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 01:16

General

  • Target

    488fd1d9dda60f932db96d3a19c5de25.html

  • Size

    69KB

  • MD5

    488fd1d9dda60f932db96d3a19c5de25

  • SHA1

    0fea6df0c7ddac7c8b0b1a83024deb918db1d9e4

  • SHA256

    e2d1eaac1577196ea9c1f33ac19d41a20c029a8c4e50ba0d86f7537cd191f716

  • SHA512

    2d1dd5d1c03d00214432fa3d9e671b00bf8a2061460ba463d773c126fcd560c3ac32063f8824108d153f5824e42bf057a8807a61917f71ed1ddc46f4bed6bed5

  • SSDEEP

    1536:gQZBCCOd30IxCADlkIC8TaKvoheg3k6kUBTwEpc7Xx7EzgWvvgosdDBgU2L7tdGu:gk2J0IxNkIC8TNvoEg3kXUBTwEpc7Xxu

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\488fd1d9dda60f932db96d3a19c5de25.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:456 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5052

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verC96A.tmp

          Filesize

          15KB

          MD5

          1a545d0052b581fbb2ab4c52133846bc

          SHA1

          62f3266a9b9925cd6d98658b92adec673cbe3dd3

          SHA256

          557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

          SHA512

          bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7C34XGPV\layout[1].css

          Filesize

          42KB

          MD5

          e57c81f3a17073a78a7c3c865f74f89a

          SHA1

          587d7c955432f1e5a87460ecbf9086ae2589346f

          SHA256

          e36f1f796e538f826beb42510edc0354133c61c7f711b827def7f91d3f7c8bda

          SHA512

          630aa9dba2aee1125103954b093af8b24907d98761e1a9b93fb6f6c43abfec3afdf53825e3f12fc3cf87fa14855daadfdbc90b1e49b503fb2917599dd77daf52

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PZ64U2GI\js-loader[1].js

          Filesize

          650B

          MD5

          ea5a5798612df63ab0532174aaf62634

          SHA1

          0f4713eef39ab07510d3703ef201885475ef0b42

          SHA256

          ee44a690e6d7ba27656d9a013b7803d69461a19444d834c918d16c1c56598a31

          SHA512

          8cfd3dc5eb7f2ab4f27abf80bea6955a00112b84ba074cfb8a1bce0207c36f6f12e2f3e90b8ebb8fedd56a5520a4a0d09397af9e6f4885addd890df7bf3b8907

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Q15AV1NQ\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee