Analysis

  • max time kernel
    152s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 23:25

General

  • Target

    06ddef1b2ee1d80d226c79454ee0e9f1.html

  • Size

    52KB

  • MD5

    06ddef1b2ee1d80d226c79454ee0e9f1

  • SHA1

    47cadbacc244d4f5f7e77058a1b29b21eb819cf9

  • SHA256

    df342885c33ba2d14d537ea0ba6b5e951e14685c262bcb1df9d53d57f20fd071

  • SHA512

    8b224cf10c6fbed3f66c475a0c8600c364a05035c4eace6bc8f13b0a4e6850e6fcb028a37f67713ab9d3d2c0f61389de12942419232ffda754653845ed451063

  • SSDEEP

    1536:XOoIGe/w/ziAWwW8jivWt6i+i99/NQeTbgpgx0H15Pjeqht4OQO:XxIgoqW15PjeYt4fO

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06ddef1b2ee1d80d226c79454ee0e9f1.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4592
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4592 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2220
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x504 0x2ec
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4088

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\99T4RIOI\www.youtube[1].xml

          Filesize

          17B

          MD5

          3ff4d575d1d04c3b54f67a6310f2fc95

          SHA1

          1308937c1a46e6c331d5456bcd4b2182dc444040

          SHA256

          021a5868b6c9e8beba07848ba30586c693f87ac02ee2ccaa0f26b7163c0c6b44

          SHA512

          2b26501c4bf86ed66e941735c49ac445d683ad49ed94c5d87cc96228081ae2c8f4a8f44a2a5276b9f4b0962decfce6b9eeee38e42262ce8d865d5df0df7ec3d6

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\99T4RIOI\www.youtube[1].xml

          Filesize

          13B

          MD5

          c1ddea3ef6bbef3e7060a1a9ad89e4c5

          SHA1

          35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

          SHA256

          b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

          SHA512

          6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\99T4RIOI\www.youtube[1].xml

          Filesize

          248B

          MD5

          cecff24af5ffb5b09cd394046f7b3dc9

          SHA1

          29587a3e6143a233be66617d64953a8e5261266d

          SHA256

          cbc1ea4d1c662852028eb8e33e954fdd2f410c8056bab410c0da7176a3c20065

          SHA512

          4432d0c8e4db7d0178f5399a7c794fbaa21cff2e00a75a08b9851e36a6d959e7e15e675c1f092c5c2c1999d8848d477748f90378c73e99744ad13af0fb0d2b5f

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xml

          Filesize

          15KB

          MD5

          1a545d0052b581fbb2ab4c52133846bc

          SHA1

          62f3266a9b9925cd6d98658b92adec673cbe3dd3

          SHA256

          557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

          SHA512

          bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6AXLYU2E\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VH9W14NQ\www-player[1].css

          Filesize

          357KB

          MD5

          f273335110f2108edde77264cebddef1

          SHA1

          7b7881cfffe8fd1197e74da6ae4fdc62b3cce672

          SHA256

          af17d4cff542b33c97ee3a95f82a21d8993c87fd3472dff534fa855828a3b615

          SHA512

          c45111893164fcfed5be0c6c1fc847495868964e498411f7dd1658c7e7af6aba6931fd73825c9ff73d0afd0e7c48af0c7b3a7fbdc08b02a81deaa51657b00c39