Analysis

  • max time kernel
    155s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 12:53

General

  • Target

    36d889b60472ac43a11597a5c3c53468.html

  • Size

    43KB

  • MD5

    36d889b60472ac43a11597a5c3c53468

  • SHA1

    614fc76a2341dce72dcdf8cc5b87e48d1aa41ebf

  • SHA256

    e72bf8b012f7b7e19eeb21a7f8c9663180faa93bed179d2ad08fff259f171100

  • SHA512

    c725af0c89002d2ab2ddeec55fa19cec7ea2c1189fa2e1b11ec04ead2de02fac7e16898c122596936e569a4cc8b0097f3895250ffec03aa1ebb38b3d3166e427

  • SSDEEP

    768:Zcd9QZBC7mOdMkGpC5I9nC4F30icpVMJ+o9wBwowQqqGPd:gQZBCCOdS0IxCI30ic/MJ+o9wBwowVqi

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36d889b60472ac43a11597a5c3c53468.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3272 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xml

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VH9W14NQ\js-loader[1].js

    Filesize

    650B

    MD5

    ea5a5798612df63ab0532174aaf62634

    SHA1

    0f4713eef39ab07510d3703ef201885475ef0b42

    SHA256

    ee44a690e6d7ba27656d9a013b7803d69461a19444d834c918d16c1c56598a31

    SHA512

    8cfd3dc5eb7f2ab4f27abf80bea6955a00112b84ba074cfb8a1bce0207c36f6f12e2f3e90b8ebb8fedd56a5520a4a0d09397af9e6f4885addd890df7bf3b8907

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VH9W14NQ\layout[1].css

    Filesize

    42KB

    MD5

    e57c81f3a17073a78a7c3c865f74f89a

    SHA1

    587d7c955432f1e5a87460ecbf9086ae2589346f

    SHA256

    e36f1f796e538f826beb42510edc0354133c61c7f711b827def7f91d3f7c8bda

    SHA512

    630aa9dba2aee1125103954b093af8b24907d98761e1a9b93fb6f6c43abfec3afdf53825e3f12fc3cf87fa14855daadfdbc90b1e49b503fb2917599dd77daf52