Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2024 12:26

General

  • Target

    attachment-1.html

  • Size

    48KB

  • MD5

    45aa4f7dab959e881ca87dc912b9322b

  • SHA1

    3a95490bd81ae4a6c8e9b5d9a4920f1d56420f9d

  • SHA256

    6a8a6395ab34936e4a6bec187d9b256dfb839a8dec8538f55392a5897fb6d0a9

  • SHA512

    31c5d02679e5488873fdc95285e06d58a31ce95098ce3756390ab402501bfb3cd249de8463746c1fd6626b1859c5dcb1c4265aaf60a8bcad2a04444dce0b12a8

  • SSDEEP

    768:ZcsFvXKeL1ogYdVjJof7dCfYuatHBAQSAO:isFv6eBoRbjKrthAHAO

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\attachment-1.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3488 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    0031ab061d23dee4dc095aeeba98334f

    SHA1

    54b84a40d8e936588f6088b1ca1298c9dbbdaabb

    SHA256

    85bdb04be7d2346144b097b7d8afdabed26723ea05469b90ed733bfc66a54c45

    SHA512

    8b8bcd2507904c34ae0c6b462e2efe86871a01e30083580c17f3c9ae9c8c4d66ea8cc3b6c2a5c22c10d888097367eb46fd8e0e95408b37990d0d521de444911f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    5d2455469e50ca1686b07bdbf9e762d8

    SHA1

    74484f51850132039de7dd8ab5d3b960818787ff

    SHA256

    bac44e01ed3c1aa5dc03d68038548bd55963aa1527681c419d14d8b2c56025f1

    SHA512

    353566d791f45b206aeff94d1fd144ee313b653b291411e047cd75e00a691970fd10760372a80368d402740e95b627bda50bae7359ea3564ad666a2e779302f1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9ALL181V\converged.v2.login.min_lgjnfq3xbrj5zvj5ionvww2[1].css

    Filesize

    107KB

    MD5

    9602677eadf16d12796552798a89ef5b

    SHA1

    7700491978676f5e4334ee871c719b9732e54901

    SHA256

    2d13d6356908f5099f72df819e22e5872031ae37a264b32be7d509571d14912f

    SHA512

    db8d20335be16560b4e2e346d61455ba7aef2d89c7bfd5d54311a71b510c08fe800c54093e5367f2bfeb57178ffd6d920b0148d41efc08d942f2025bd002efc5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9ALL181V\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Q15AV1NQ\ux.converged.login.strings-en.min__vnug8v1o1-mkptmkuydsg2[1].js

    Filesize

    42KB

    MD5

    fd536e83cbf5a35f8c90f4cc91461d4a

    SHA1

    c14e2b30ba1702bb008755f7694e2fed34ddb327

    SHA256

    6a5fa16af06213111110aefaa9a14310ee729f9dbd8a8839bef0fb46e2bbb81d

    SHA512

    bc93b0a75093149830e08b1330cd073b44dc2c4111e8d90ed518bb83539318e6819f4ea06657ac3b50b492eac1283d561d0d1af725ed0ff1267ec6d1343d6a82