Analysis

  • max time kernel
    137s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 13:10

General

  • Target

    376370053a9ddd26bf4045145c0b037d.html

  • Size

    18KB

  • MD5

    376370053a9ddd26bf4045145c0b037d

  • SHA1

    5a8dbab31a9d40ad62cb8524a69c4f5f23073ecf

  • SHA256

    e5b8b373ceaf3275ae5f6db5ee87f8f313c607ab1d1a3db98469ba163825e7ed

  • SHA512

    4f3667c46c8a40b5b6a68b45d2f2c25efb485e4b1620106ce9ae21bcfa753c2a1e6251971402703ba412d66315ac0ec3a38072cf93f7c4468655def53f82c537

  • SSDEEP

    384:++CcNaNS9HKuIenu9VNr0TcTU6mB9QsmrCxubGRXNd2V:KcNkMHKuIeoVNmcEB6smGo6Xs

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\376370053a9ddd26bf4045145c0b037d.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4072

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

          Filesize

          4KB

          MD5

          da597791be3b6e732f0bc8b20e38ee62

          SHA1

          1125c45d285c360542027d7554a5c442288974de

          SHA256

          5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

          SHA512

          d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verC89F.tmp

          Filesize

          15KB

          MD5

          1a545d0052b581fbb2ab4c52133846bc

          SHA1

          62f3266a9b9925cd6d98658b92adec673cbe3dd3

          SHA256

          557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

          SHA512

          bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8D1Z5HG5\styles__ltr[1].css

          Filesize

          55KB

          MD5

          eb4bc511f79f7a1573b45f5775b3a99b

          SHA1

          d910fb51ad7316aa54f055079374574698e74b35

          SHA256

          7859a62e04b0acb06516eb12454de6673883ecfaeaed6c254659bca7cd59c050

          SHA512

          ec9bdf1c91b6262b183fd23f640eac22016d1f42db631380676ed34b962e01badda91f9cbdfa189b42fe3182a992f1b95a7353af41e41b2d6e1dab17e87637a0

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UCK1SA0Q\recaptcha__en[1].js

          Filesize

          58KB

          MD5

          56fb56b4c5a83dd03c3cc50401f75dea

          SHA1

          2f5448f51a001fe8eabd620cb295f0ac058c6274

          SHA256

          7414383fcfca6c2f1185c591ae8595998ea2baa30a343ab7a452a81000bfba61

          SHA512

          053f001aa795c8b8096eccd167fceb929b74edceabc9308a4cac0129a67d2dc494f07a61304779004d5ce9b4dda4c6d9aca306b7bc6e13756a939bb01126717c