Analysis

  • max time kernel
    103s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 07:27

General

  • Target

    5c80eb5d347d28d82c94584169a50414.html

  • Size

    8KB

  • MD5

    5c80eb5d347d28d82c94584169a50414

  • SHA1

    5de8dfbe9180bcaa523866dd3c11ab5a3b481670

  • SHA256

    e8b080b972c1b52f2c2fb8cb4e4728a8808a16204b948d3a5fde94c1c8aa11ce

  • SHA512

    c0b2ecbbd132af7d14df7b91e48281dfd7f451c365e5aee658fe31b0acabb19972bfb72a65d00d58487795ff1bb4ac2dda614a17d242da15d61e7a634d3ac2ca

  • SSDEEP

    192:duKmfG3mEHEpVENrLOrmA9W4N2rL1a4B9g59YNHB0Tt0dX:Dx5NOKMWdrB5B9g507X

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5c80eb5d347d28d82c94584169a50414.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3744 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verBDF1.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PZ64U2GI\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

    Filesize

    3KB

    MD5

    a6c529c73075cc4f53c475154591cefc

    SHA1

    bbf17c8b182746e0ddb54fb2c058dc422a820d39

    SHA256

    d743c7af67ea6842aa98bfd8fd0dac5a33755cd965d70f60d53a0dddf89c1f42

    SHA512

    8c5eaf59a0471deb57f328844887b85071248a473d3d9f64677778b9da6fc7e54b96dc817a5612d3d7d251495b442baf36c6686ed405d5b2cb8e3891452422b2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

    Filesize

    3KB

    MD5

    1912903746f31c565472d3f85e76ca29

    SHA1

    18345d241802a4f8c3683874cd7f3989a836561f

    SHA256

    98d06cf47b327b88b971fd2f0259b3bee316ab9fd1f9f94d9b7ab7159f362c1f

    SHA512

    387649d36bef01f916022696e599ff6d42ebec61020a7e651596c1d6ef9c41413003f7fbf0af646f5642380aff5906540ce39e3cf49b15697e933d65f9cc6cd9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

    Filesize

    3KB

    MD5

    4eea467cf9efa77c69c6022f6381c8c1

    SHA1

    1a8aa5f898a51fd7e75074232a22575b07da74b1

    SHA256

    4fdb184f9f588b4fde7055595bfecf737bbfacf8bfdd8a36986a71aeb8ee473c

    SHA512

    86461e411a8c4db5b0e37093d4ce1caea14250cd4c50f78edd449a481985ef5f5a902fe85828faa7c46503e4c30651d21d2a2c9103f51f0455c7c645685c0e43