Analysis

  • max time kernel
    141s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/01/2024, 22:18

General

  • Target

    3e05a7d74681d91a7f39be2c203f1422.html

  • Size

    57KB

  • MD5

    3e05a7d74681d91a7f39be2c203f1422

  • SHA1

    d87587eb5b6fa163b95034f46c03a0b73fa0b139

  • SHA256

    e1e530994c473ae56a15355197b2a0f814b6af1eab47929210f03a56a89fadbe

  • SHA512

    48d2799d1c1cdd89b3b49abc4dcfa5ef872fb914fb3016ed2206a2fb2150ca65d72949d288c14ef94eecfa5acb6b893e481429aa892e382a7597f5688f9ba135

  • SSDEEP

    1536:gQZBCCOda0IxCZtIUfffKfvfLfWfnfaf1fLfZfhfbf2fdfYfHfuftfMfufffQfHa:gk2E0IxIHSXzOvC9TRpz+lA/mlEm34va

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e05a7d74681d91a7f39be2c203f1422.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4004 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3612

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BJCNBC62\recaptcha__en[1].js

          Filesize

          382KB

          MD5

          d5318336d6768abf5e84864564193920

          SHA1

          71865b961d3c41cfa095a40eca2c4ad33eed493e

          SHA256

          e81d39e652e1e19752a9ccce5bfb043c701a72b0eaf04ead66685270dd2a33d2

          SHA512

          c142f366f25120538b654b7c7d328c73819404a35b7c5cb710b5b31d11da9e8823cdf265c25da5901d1b88272dee7481f8837d383f9b3cd6529d9eced55d4b48

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\js-loader[1].js

          Filesize

          650B

          MD5

          ea5a5798612df63ab0532174aaf62634

          SHA1

          0f4713eef39ab07510d3703ef201885475ef0b42

          SHA256

          ee44a690e6d7ba27656d9a013b7803d69461a19444d834c918d16c1c56598a31

          SHA512

          8cfd3dc5eb7f2ab4f27abf80bea6955a00112b84ba074cfb8a1bce0207c36f6f12e2f3e90b8ebb8fedd56a5520a4a0d09397af9e6f4885addd890df7bf3b8907

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\layout[1].css

          Filesize

          42KB

          MD5

          e57c81f3a17073a78a7c3c865f74f89a

          SHA1

          587d7c955432f1e5a87460ecbf9086ae2589346f

          SHA256

          e36f1f796e538f826beb42510edc0354133c61c7f711b827def7f91d3f7c8bda

          SHA512

          630aa9dba2aee1125103954b093af8b24907d98761e1a9b93fb6f6c43abfec3afdf53825e3f12fc3cf87fa14855daadfdbc90b1e49b503fb2917599dd77daf52

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QSO8CY24\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee