Analysis

  • max time kernel
    172s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 15:54

General

  • Target

    3a7eaaf6ddfa56da9d67684a43171482.html

  • Size

    432B

  • MD5

    3a7eaaf6ddfa56da9d67684a43171482

  • SHA1

    a9f84463a3b2f9b052ec955d4c244c88c14bc829

  • SHA256

    ffc56aaddd612bca415c572821cbc1af13986656f9eb6d820ccbf8f28ad49256

  • SHA512

    c4099af71c3f5e56b2137c30220ca369aa1294ba8626b46ebf610ac7a66cb9d7089daa4fb682aec55b0f0f8464840954ac5c0419a2f3b795ce6ddcfbbce08a98

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a7eaaf6ddfa56da9d67684a43171482.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2392

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\iay4xvb\imagestore.dat

          Filesize

          1KB

          MD5

          e0e451eb942df9bd23445bf5c91c4593

          SHA1

          e77279d51eff0ce1f63de13be591aabb666b27a9

          SHA256

          1e4e8727ed0bf22a7b0635429c6a3ebd0f1bb55d331b0a239c6bd517a79964a8

          SHA512

          47ae6cd9d94b09df86f85705535d1df4ed12bd1d9390d4942c298a95ec48dbec51a2c27f9e3310e51dab5ec7e09472755616c05032a101b9a09d47488de98841

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\43O0UZKG\favicon[1].ico

          Filesize

          1KB

          MD5

          91abe01116ab422c598e9c8af72cf4da

          SHA1

          0f2815fe8e067d48537ad168225ab4674271fa27

          SHA256

          b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc

          SHA512

          a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GO8BH966\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee