Analysis

  • max time kernel
    131s
  • max time network
    144s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-01-2024 17:47

General

  • Target

    file.htm

  • Size

    284KB

  • MD5

    52ab69899382c61cc1813a44e7eb7599

  • SHA1

    019f9c20de31fc35952cb30dc3f57694d2332f52

  • SHA256

    d9b4536fe68d0fa5671e41382d114ec0964c043bcba1a95baa2017022f7ba284

  • SHA512

    db63d4c8d28c0b780c151a7942bb3c71f1d46fc8f26f31d2317cae1f88ae7c554a0d8c4218aeae2eb8e94f12ccf2ee88b6b056f553527d129a7fafbd883c95ad

  • SSDEEP

    6144:E8cXLwBPqV+cqugRjQdCBzV2kG/u//B7noosSVvHNgttQ8MPVswkIvP3Bgo88qtT:1cX0NqVqugRjQdClV2kGG3B7noosSV/c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3648 CREDAT:82945 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2164
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\file.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    f48df01cfedeaaa0ea53c66233daeffa

    SHA1

    3975f5b43fdc6f558e98fa73953f5e3f5f10389a

    SHA256

    951545ef644e49a1414fff3fa4de66ae0c39bd7808df2254acba04b5968be693

    SHA512

    b4c750473c25da03876e807e448ebbf5872c92f445f4ff19b94e4094d95c18b3cf9cb96e2f3d10fb28d2d85615af99c2306e645118c82f42159ffe4fbafbe336

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    5cebaa185398bd64c2c88ada1b5bcf6b

    SHA1

    31021753ab7809c967a4890a18b5bc27e6c702e5

    SHA256

    bb2a757a4402a8ec5908c2feb491306712213e713472dd90b7c98d86ea63442b

    SHA512

    90533f0773d162a6692c5c583b3707c5d48fac491ebc537a78ffb2083740937674bc149a448bb49d676dddf8950b4156ccd5ee4eb5aefd6c63dc2410f2636478

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xml

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\987H2BR2\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\R8IMVRKB.cookie

    Filesize

    545B

    MD5

    969dd4ae3b3bf9adb112b8a3b72fa3aa

    SHA1

    7297989c7560ca889294b2bb667e9868348c8dac

    SHA256

    439e553aff85854fe91b3c4d1046f1774549c3977bfe4abd5dcf24163f5a4fbc

    SHA512

    7e1711f8a6f2db54da4101c52bb197ddabced39ad04ac03571baece9738186bdd0758899871c9a43457e1f971d1bd21d859622eac1fd8215077f23b6482e2f68