Analysis

  • max time kernel
    0s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 05:53

General

  • Target

    10714c757ec8a5a99c8cf0b74271d6bc.html

  • Size

    71KB

  • MD5

    10714c757ec8a5a99c8cf0b74271d6bc

  • SHA1

    676ca5cf14a756a3d83cea0c1c3756236a83962b

  • SHA256

    d74752f62a1eed23c5acbfc7447171b1c32bd792a73880cafb5450be91fa0faa

  • SHA512

    5b342a18ccfca32a77f8dbc575c9f41abfc7dabd202f3878e4aae0407abd5364e12a5a7e43d83ca7a280709cee85349bf1af01ea335f440c0f063e32699891eb

  • SSDEEP

    1536:AkGLNGZg7L9XA9sAogJ8JeSXgqnTjL8xKO/wyHWVULZpTdpUsmd3f4yaiVSQgvbj:Akw7Lu6IOLS/vY+mOxgF4DtN

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10714c757ec8a5a99c8cf0b74271d6bc.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4572 CREDAT:17410 /prefetch:2
      2⤵
        PID:3772

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      ef7e600e75b69943888a45bdce7d2938

      SHA1

      3c780e1b92198ddfc7e3e5759874f006f18272b7

      SHA256

      3c1c1f39f5bcc2cf8c0b4664b18e7cc2fd14c05ec5ff914327d1d8b1cd184218

      SHA512

      c0cecf3cb14990db6507d151ed1468cfa35bfdcbe4fce22631dbba5672bb60c326a34e3a8d97a778ed6e2cc76a80ef8b1afd31a44c8cdbfcdfd4ac7c496847dc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      404B

      MD5

      da9c54dc361c2d1bbe53a3ebdc24a104

      SHA1

      ae8cd49d13a81052b3a8fa5f91d20a09dee1fbcc

      SHA256

      29772819863c6cbf16124ad2c2cf1baf655c4736ebe8cef944d7c53ecef84a2f

      SHA512

      3aec205eb8f50f9543f160d89656ac3b07402ebc2f27ad3f9ed198b6d290ccc2cedbcff85a22d2556e2408e317be5e992fded7b8feb0a7226077cfa428325782

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verB7F6.tmp

      Filesize

      15KB

      MD5

      1a545d0052b581fbb2ab4c52133846bc

      SHA1

      62f3266a9b9925cd6d98658b92adec673cbe3dd3

      SHA256

      557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

      SHA512

      bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d