Analysis

  • max time kernel
    137s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2024 18:27

General

  • Target

    3d8f330ab9fe7cd299143eec0c36f151.html

  • Size

    57KB

  • MD5

    3d8f330ab9fe7cd299143eec0c36f151

  • SHA1

    d46e150f14ae08acdfa5563506c69322e530132e

  • SHA256

    e2faffcecca542aa2114a1428c9ee28133778206542f8a112f7bd48753f86b78

  • SHA512

    40b4d0bee598e37a6ea80f71eb827824b46d8a33d47e26ec152cef5cca4833a2623c08a5a385d42cd2f7ab5f4fe7cf4643dd89b6e97819d38e3eff2eeb2d7064

  • SSDEEP

    1536:ijEQvK8OPHdFA6o2vgyHJv0owbd6zKD6CDK2RVro7gwpDK2RVy:ijnOPHdFI2vgyHJutDK2RVro7gwpDK2m

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 57 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d8f330ab9fe7cd299143eec0c36f151.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\64E544B76338020D780BCC40A2A2B366

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\64E544B76338020D780BCC40A2A2B366

    Filesize

    414B

    MD5

    94a77901f871b10afe5a3c47da4fd602

    SHA1

    9d47dddbac76267df8c08cd61f8ab052c2487408

    SHA256

    4223c1562f1315ebe4a52f0637861e3a18ebd08702e5f6e2e169cb4fc414a8ee

    SHA512

    65d0a91e14da9fb56394eea2be4c59e2f2edf16b0174b32fa6db7d86ff10957d12f628db5118cb7cc180099db13c6e487f274ef4bb97b52de37a5be14de7a571

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\54YWJBUA\www.dailymotion[1].xml

    Filesize

    166B

    MD5

    5daf895eb28b6207c3e1c6a56805e667

    SHA1

    c5e599ad4a1bcc5a2f85d879411883b179ca2a5e

    SHA256

    15e23e67464e131ae4c9140dfbfbcfff6acf86d7539fa5587bec2fb6169fcd11

    SHA512

    c910f6b77d9e7edf69e0b6fa0203b084fa42944c454c07b8dd26d51997820ec02f5b927ace4523d19ad3ea78550bc62e60431955ec2212a32060d349d13cb841

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verC4D6.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Q15AV1NQ\f[1].txt

    Filesize

    34KB

    MD5

    177f413f34f6226df1a1d91d2958ea4a

    SHA1

    0f70736bd5035ce5f3ac9d3cfd65299cd92d35f9

    SHA256

    71c78f0184044c0b81f320c30cbc41136049f84b951901edf9c36ac9949a3d5d

    SHA512

    a2348d8193fc1a5fc76322956d9ed7925fa7af7e0aeb5c43a7151fc9974b3b5af7d815486551864b9404db36611433b70d4e7f3f5876420ffa7254840b4f050f