Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 06:44

General

  • Target

    2c18d3c8d1ae7d92b3626cc3012c9508.html

  • Size

    22KB

  • MD5

    2c18d3c8d1ae7d92b3626cc3012c9508

  • SHA1

    de2525652d04860cf35cb554617cc3c390631318

  • SHA256

    8d7968b7fdea9faa9acdb7c495efd7c6e8a84ca2300cba19021e635afb163886

  • SHA512

    42f527129be6900a1884781035a9af4ef49f0c58d4db00b91cb7e34efd230efc270bafd9fb4b88512b025e5592acc4724d607ff8ecb0feb794727eab83007c38

  • SSDEEP

    384:XeXaJgpX84HQfHQqOFSHGwjSHNwFEHTwFS57wFSHErLVFX1kG+:XoaJgJ8XZFX1kB

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c18d3c8d1ae7d92b3626cc3012c9508.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4572

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7C34XGPV\errorPageStrings[1]

          Filesize

          4KB

          MD5

          d65ec06f21c379c87040b83cc1abac6b

          SHA1

          208d0a0bb775661758394be7e4afb18357e46c8b

          SHA256

          a1270e90cea31b46432ec44731bf4400d22b38eb2855326bf934fe8f1b169a4f

          SHA512

          8a166d26b49a5d95aea49bc649e5ea58786a2191f4d2adac6f5fbb7523940ce4482d6a2502aa870a931224f215cb2010a8c9b99a2c1820150e4d365cab28299e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7C34XGPV\f[1].txt

          Filesize

          34KB

          MD5

          3e47ef57df160664693a84aa6943a9c3

          SHA1

          2770e2c7f0b1f5d1b7210ec273d88f49ed5a416e

          SHA256

          a490f649cd5ef6c02a82668a15d665adc34ffc7a94979bc2edb89505df28da26

          SHA512

          904687d537bc0c935b6b98c2ff77d48a0f7b59d1f4380cd9f1113214b698b8e91842ed89272745779a92896c2a2866b67734f6eb1255e9c9fe54ccd0e7d0909f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Q15AV1NQ\57883_netad1am[1].js

          Filesize

          22B

          MD5

          32a0cd4607174ab7e4153dc83f81c6d5

          SHA1

          4bc827a169f871b38495407106bf682929e2dd70

          SHA256

          8a71f8408f75e31fb30f205fe0f7e32eeb6387c40ece4d6626499331ba6d8f2c

          SHA512

          847c5fc1478f61705a8f1d8f66457500a0fd41237aa4a11628bb8509d5fe3c2c1d3cc4102de4dd0603002a9cb3a15b6cc7350d545099317d4de5e93b5734b53a

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Q15AV1NQ\httpErrorPagesScripts[1]

          Filesize

          11KB

          MD5

          9234071287e637f85d721463c488704c

          SHA1

          cca09b1e0fba38ba29d3972ed8dcecefdef8c152

          SHA256

          65cc039890c7ceb927ce40f6f199d74e49b8058c3f8a6e22e8f916ad90ea8649

          SHA512

          87d691987e7a2f69ad8605f35f94241ab7e68ad4f55ad384f1f0d40dc59ffd1432c758123661ee39443d624c881b01dcd228a67afb8700fe5e66fc794a6c0384