Analysis

  • max time kernel
    4s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2024 13:14

General

  • Target

    43c5b2e57a42de9efd9c401a4c4569d7.html

  • Size

    77KB

  • MD5

    43c5b2e57a42de9efd9c401a4c4569d7

  • SHA1

    eca5fe56c62bcfd6c43682ad395be0b78066943e

  • SHA256

    7cee337596c66aeddc27ca20ce2fe7d7fa5d8a8a89a408303d9a6d497d9edb1c

  • SHA512

    403fa7f8456f53868686366026d1ed42d03f8081ae4717a3aad0d0ddf4bf6074f1d959d92fcb04dfd5b8ec9d6fd14f8dae71f05336f31f7571305357f1c8fd50

  • SSDEEP

    1536:/PTupBkumudZL1qAuv0utvWd+odChAJVojugmPFh5gdDMll5intqKXyp:qpBkSd+odChAJ2Sgy8ntqFp

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43c5b2e57a42de9efd9c401a4c4569d7.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:17410 /prefetch:2
      2⤵
        PID:4608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver5697.tmp

      Filesize

      15KB

      MD5

      1a545d0052b581fbb2ab4c52133846bc

      SHA1

      62f3266a9b9925cd6d98658b92adec673cbe3dd3

      SHA256

      557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

      SHA512

      bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BUOTXRX9\px[1].js

      Filesize

      346B

      MD5

      f84f931c0dd37448e03f0dabf4e4ca9f

      SHA1

      9c2c50edcf576453ccc07bf65668bd23c76e8663

      SHA256

      5c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584

      SHA512

      afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BUOTXRX9\rpc_shindig_random[1].js

      Filesize

      17KB

      MD5

      f019fdda31635d2a31b151ad8ad56c7a

      SHA1

      6adcbec55f66ffaef83d9a134423aa98eb2a2189

      SHA256

      c7fc0b1526533002c956ebf8e8c42c3ad3f96c41ace73fb4063cc89051944831

      SHA512

      fc278c12316e098976833882a38c788d812f9d36bd1b9b2b8c87dab4dc906af26a860df95436ea1b7d509236d44d0533d475a153437f8f5d42653fc28a77ad64

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\J6M39GIU\478691279-postmessagerelay[1].js

      Filesize

      12KB

      MD5

      92169c8a0fbf6e404267d0705cdbdf42

      SHA1

      a5cd88b74ca5ced239cdbfb458fe25540d671f46

      SHA256

      dba668b49a111527aac8f616b9053ea57c944e01a84ebdcd02a13da921223384

      SHA512

      8c5d35ea512fa7be367cd9a9ded2f23822dcce730e5502a355ed0d48949ef763eab13be0d50a66de6b0f8419d6a002c12c4ddbf20d97f5393ba922e48a4f02e2

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K44LV95Q\cb=gapi[2].js

      Filesize

      32KB

      MD5

      afcdff2c78c1720ea54748390b7e8fd5

      SHA1

      a8d0af551ec3ae84245fe5b2807bae1ccf42189f

      SHA256

      0c0e91c79572c4a1519b8939617e0895a29f170e57b7cb5345eef38d06bf64a6

      SHA512

      9a9275ee96bf15947ef20786ec7ffd729120b43f39decf7ddce4bbc97ce804206d5619d97621abdb2edfa5e0eef0e13d433d11418b4d913e2448d50e1f98fc91

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K44LV95Q\suggestions[1].en-US

      Filesize

      10KB

      MD5

      57abd40dfc1f684ae88aa77a24af0da4

      SHA1

      41c572569c2ad54974ee3e9caaa11a666e37fa52

      SHA256

      bc8ff06927f022e8cf198ae0e2c8bebf9fa8de622c71fcb5045ae73dd21242ba

      SHA512

      805041a7a7598c8bb8614f0fd530f34f3d62d8d9c18d4a44ef13f5bb0dcfa275940f5db0aff75f84cc25628195fa25194a2ddf4b9aa2e4a9e4e2be660bc56095