Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2024 02:21

General

  • Target

    42859ced7c073c0a4521070a8753c13e.html

  • Size

    60KB

  • MD5

    42859ced7c073c0a4521070a8753c13e

  • SHA1

    4d6c5d3c17e31e5805e2758fd7fd0b510140e4f8

  • SHA256

    9c88eb041733edd5cac5c42122722170e121a2d4c5e5d681266be36db8c78c99

  • SHA512

    e322b12c8efa0be157e5ea14a0d32422af069f22fef3766dda86aac3edf6ef459793999527f8f40de1f22177f759f322892238be3c255c3b676da2ad085bdd95

  • SSDEEP

    1536:JIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZMHr:sMH5FJsMpoUsQJ7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 13 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42859ced7c073c0a4521070a8753c13e.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1556 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ef0413e6e50d0c4cba0f5b5af2b238b0

    SHA1

    71b40bd1131789577e3783e22c80a081c5c55a7a

    SHA256

    580f8daf29724827b00d2cd5650d0d5730bb7b379b7201ed3032d9de7cc33068

    SHA512

    36051ae2e98c094564ee3338b9cbfe6083e8f9e1048c2157e0659af028d5647cd163712879cb1bf55ad619c3c0bd76780a7b6f11f26a6577ed6c158b43b076b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    080f3bd4a630cbb8eae11e52d0bb188a

    SHA1

    572b1481b47f0a872f1102f1acd599f47cd8784c

    SHA256

    fa039e6b558996ed78dcec409ba9968bd61809f426da8bb88878ca4193d355e9

    SHA512

    ea203a949f6945cd2e54432352c8d277d8749c263b639eb31af0302139d35ff58619a3c25ed2966737ac2ee9eac1132a7652fdd634c8fc00dea7b24e59192957

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verD0DD.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d