Analysis

  • max time kernel
    299s
  • max time network
    299s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 16:44

General

  • Target

    email-html-2.html

  • Size

    55KB

  • MD5

    de3167a596c408e3e1d4b6cf6220030e

  • SHA1

    013d69ecd9d4249e2d5cf44ebdca505e16707707

  • SHA256

    23e4142520bd7635f221435b76fd6a1168b39ba659541d242c00f8e2802407c6

  • SHA512

    150e6305a1f6ceb75c7fcd1195fefc87532271443825c0c067fdc3146d255a8aed8edd639f50f1b92c31c97a81b06ded94e04efb7dfdc571c8e0e41674bc42bd

  • SSDEEP

    1536:BNZWAv+eeeheeejeeeceee3eeeSveeeDeizHvuIuAs:BNcbe

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-2.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3496 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:548
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3496 CREDAT:17414 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0D194E4F69EF76AADC68F8A3E6584940_41E5433BDB9133D8DC233A9B8EBB1065

    Filesize

    2KB

    MD5

    1ae8ebcd7f9eb281b135707586d04c21

    SHA1

    cbd805c4dd3bfbe481f5889b777beb299957cef1

    SHA256

    47f35541ee7fa9dcdce2287b4ccde1d0faa58c8dc27fa4e0f3bcd4a70ffa137a

    SHA512

    fea21095b521733884288e5df0cc93857a5c56b2a6838a6379f2cacc8c8a1dcbb38a3080f099572a80d3830c6e765ae1227fe0ddc81bef1541c738eaee1c6bf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0D194E4F69EF76AADC68F8A3E6584940_7FD11372B278018C837222C7E2D6C14F

    Filesize

    2KB

    MD5

    eeed602e39a4698fe584d61f52305926

    SHA1

    b92744b3e31610ded82437a14ad88f93ae1a741a

    SHA256

    77167770fc1a46699705afbc103e8997e5b3afdb2a0787f92386e38fcfea0946

    SHA512

    7237523b4e09f3a710476b16fa70c841c61b72fde5aa57b8e3d824521aa6b3fbd6ac3db830a583f47986d748b3c5f0e89d05db2437baa6894db0d37d3f10ff71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

    Filesize

    2KB

    MD5

    644852d5de34c94d996b8060d24545e9

    SHA1

    8e9bed41c13f35e1566f1a1180da831ee5d67117

    SHA256

    616de880dc8ec6bb6b4c540161d3be1dcb51ce561991bd8e9b09f576c10a764c

    SHA512

    618560237c853e360698e30e0e58030a5d09f85626cf5bb992d7ffd52354af3616042b5da0015f1a08f3f78f45fd17909933d0e954fe2fd2dd5918d2b726529a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

    Filesize

    1KB

    MD5

    156872660e03e199e6c11d9c2953fc60

    SHA1

    6015999759cd96cba9faa1938833e4b2751f068b

    SHA256

    ed3844d50748fa0a5707a77da74dea47cd7d8d7d23932ebde5ad43d3c4bf88fd

    SHA512

    d6c3141300553c7b853b0503a0af4256a0fba1a8e16b46b80cef67d687112e44466ebe03441d9af37a678958b8ba12b974978b6d45b72d13549128f10feb0450

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0D194E4F69EF76AADC68F8A3E6584940_41E5433BDB9133D8DC233A9B8EBB1065

    Filesize

    478B

    MD5

    7788ca9f5a2f0bb4d0ef5e9de8bcaf41

    SHA1

    cc3110eb849702325c9ac42dff25440a3f8b8829

    SHA256

    d56392d71241dfa7f2de6546c28f9604ba136877709bc58f904bc9648441293b

    SHA512

    c1bc2c7b90fb0bec7212fdc448d1727d1b105bd039521c1567be2861f1a335f9526143867e1ebeb7b8954594648f85d8a1d076504cd51f00cd5920625de61608

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0D194E4F69EF76AADC68F8A3E6584940_7FD11372B278018C837222C7E2D6C14F

    Filesize

    462B

    MD5

    e61b5f91f09228980165bf523155f013

    SHA1

    b9c60c28a07d9872217788dcce27b07ab77b609b

    SHA256

    2bcf270f3af1944466e1e303caf149082f079a9801a0f274d36921b61c5a912c

    SHA512

    b58a02c55dfd74d8f17ba7841fa269766109cf3806963e0f3657840534066a879be891b69a052fb1a61bf209d389ae1db9a18ff82a05fdae8e459b378e13b39b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0D194E4F69EF76AADC68F8A3E6584940_7FD11372B278018C837222C7E2D6C14F

    Filesize

    462B

    MD5

    9a2c3f63882782f3068040a1aaf13334

    SHA1

    204c22d86a617a007c6d35f11d1c26132ecf0458

    SHA256

    9cc10875555f531f0a37439ebdde30add74b15b5b9bb6a474c064d1b635d318b

    SHA512

    ac56c6dae8a18e7019121ba72d7243cda0dcb684d57b2f98870db3228e055f82e73d9ca1bb1bd3c18a16e03de7a1633c249033bcf08b7bcafeb784042ad74a5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0D194E4F69EF76AADC68F8A3E6584940_7FD11372B278018C837222C7E2D6C14F

    Filesize

    462B

    MD5

    9c88cf278d0429f98e52c74df88c0e1a

    SHA1

    6e1f9602c49f4df02316986e2e94cfe7d73f88b1

    SHA256

    7f79b183427dc9cb9821c99cec8b58cb947e62a3020fc8df2538ee91fc2bab7a

    SHA512

    f6cf85b518153801056c4a0580e008fef8c30eb69b696df0ada62b18c94b32dc73cef220acbacc69a8b190e945f171cee84ae8abd1b4e0951003dd1d69a68b94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

    Filesize

    450B

    MD5

    787844d1865b8d85d5ba3dc8d30d0c79

    SHA1

    6d60cb4a83178e40af4cfb33e6cd2f0f9c1c5e5d

    SHA256

    256fad519025bd2fff9af2a762a68a00d51db22131afec171af0ba0f0ada763e

    SHA512

    26d18f9d7e5898338f6b24be100ecc9a7384241b7a31dd2dda670558c01db51ef1ca4851cf24e548f2a80fe8e957ffb19835ab3a219dffdd5acf6b976afa6c68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

    Filesize

    458B

    MD5

    d40bbf56dc357af3dceb2410ba66b2e7

    SHA1

    3196a22c9c804eaa5c7e3cc555ca1bc89020b7f0

    SHA256

    7e42fbde4476b63f571a5f8e48036217d6aa5e808806a589d9b7539e33747d62

    SHA512

    b38b4dda5251047c433f9907aaae96dcfc1c92dd168dd1cb4942249fc13aa616e005571d2f9c8fa48f241b23218b2848c66adf504135aad46a8095d653f09914

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ccxtump\imagestore.dat

    Filesize

    6KB

    MD5

    a4193010841d731cb707a70b73536a8a

    SHA1

    fb8c2498e6265f1a5bfd95dc3c1a22612698b0d6

    SHA256

    de7adfb103e6e26702d85974b0e1bc52c940d611a82f356644baf220dbfb190e

    SHA512

    a4aadc1aa6af8238ed18a6aaaf7086578d6e8346bf4b237cdae5448fc4803dfaa5e6da7e3042da17b7b854a5ee4ff4434621e47d8a7f8a97579e738a0df84313

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0A013ETK\gB76kJXPYJV[1].png

    Filesize

    1KB

    MD5

    f7dfda244d34f71c9050bf628b32a0ed

    SHA1

    55acfe6e1c1e1f8b02731a828cf6607c7623716d

    SHA256

    2baeebe340eaa2737d04921454df1fff80ac937c2929681191edd0a878dc1882

    SHA512

    5290eda95b9316b46063d5f74a7bbb0165a0a51aed7dda48757b3895dec4a7fd4633008a1e6620d59aa8c482166043f1791029e97b52d8a0a786be37c61eb159

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0A013ETK\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QPBAQNGM\weblite_load_logging[2].png

    Filesize

    67B

    MD5

    c9d8ecd0571da8622611daa5bd3e1f02

    SHA1

    53583e58078c5304411b22a91aefa443aac48bba

    SHA256

    aa7b6c81e85551eeb5c4809f1e683efa0b780c33d12ddfc2067a1b136803e45a

    SHA512

    cf439400f9d9f371508489f4c53a28002b7aceda2f7f0e8621dc020c6bb18fa1222fef310a18ac1c44dfacedf319405b4dc0acb47c9368192da66c06e6651f57