Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 03:33

General

  • Target

    50a1e8eee286069421d5d2beb2231b2a.html

  • Size

    19KB

  • MD5

    50a1e8eee286069421d5d2beb2231b2a

  • SHA1

    555b44c9c92f4709fd4ecb7abb2f35852af3c437

  • SHA256

    e1276b17ec7d1fd3eba508715fd41578d0d22685ff10595782000b77958b9beb

  • SHA512

    a8ade7120982753b5782e49226fb3a6d88b2681bbf1301b44554070d1659e0e90efdf467f7b737faa3ecdd77aa4f6794486d078304b1ee2e5a216d3117cd8ea9

  • SSDEEP

    384:4+QfPFd9QZBC7mOdMAqtKfpC5IgSnbmFe7Ackh63oLDPd:Zcd9QZBC7mOdMA/pC5I9nC4IPd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\50a1e8eee286069421d5d2beb2231b2a.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3452 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\buhspo8\imagestore.dat

    Filesize

    1KB

    MD5

    e65ba429eb633e0db940a820f73bfa52

    SHA1

    e19da344953240d60251661efad33ecd1cd25945

    SHA256

    87152df6cc1a649e095f62a3a2c4918a6b542aeb447b72c585c70b0daf1671e3

    SHA512

    623d9a30412b6ff4bc1656a5b3ca9fbd901a1dd8848ee3eb0a7dd6f0a363bd930e2939b44ac54c15fe6fae9481457e72fc0ada2cc48036156075b846f9f58923

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0SGFK56Z\js-loader[1].js

    Filesize

    650B

    MD5

    ea5a5798612df63ab0532174aaf62634

    SHA1

    0f4713eef39ab07510d3703ef201885475ef0b42

    SHA256

    ee44a690e6d7ba27656d9a013b7803d69461a19444d834c918d16c1c56598a31

    SHA512

    8cfd3dc5eb7f2ab4f27abf80bea6955a00112b84ba074cfb8a1bce0207c36f6f12e2f3e90b8ebb8fedd56a5520a4a0d09397af9e6f4885addd890df7bf3b8907

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BMK4G1YN\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QTPKWBD2\favicon[2].ico

    Filesize

    2KB

    MD5

    cb546f0ce2ca2505cbc9088d8a4592e5

    SHA1

    d87b70b1a34f4313d085de80da3aa4e8845af904

    SHA256

    0c3851f8f6d7b9dc63645a68b0db991edc9162620b9d757684a4a20206c458fb

    SHA512

    b6fcd078f43082daf299a49646280ac3a30b91d10dcfaf8e9fb9e8317af417e34d45ae7397af9507d4101b7bcc58169c2f64adcaa253fc08204b98020b20b551

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QTPKWBD2\recaptcha__en[1].js

    Filesize

    502KB

    MD5

    37c6af40dd48a63fcc1be84eaaf44f05

    SHA1

    1d708ace806d9e78a21f2a5f89424372e249f718

    SHA256

    daf20b4dbc2ee9cc700e99c7be570105ecaf649d9c044adb62a2098cf4662d24

    SHA512

    a159bf35fc7f6efdbe911b2f24019dca5907db8cf9ba516bf18e3a228009055bcd9b26a3486823d56eacc391a3e0cc4ae917607bd95a3ad2f02676430de03e07