Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 20:37

General

  • Target

    595badda8c15300b8a457f857eaa5bc9.html

  • Size

    80KB

  • MD5

    595badda8c15300b8a457f857eaa5bc9

  • SHA1

    d2043b5fd3827a0c24f54dd5559dde2b44b3b0a7

  • SHA256

    dc77407be8c5644b0299dec2bcf47fbf8bf1e015c2568d7af80d9099beb29810

  • SHA512

    c3cf58560df7d0622411f9d81f9dd46f23a6337af9692e9af14feaf3595d3408dfd16b5150e2ac4dc211dffac9578f1a44b199afc4b40e609cd0fbb4e7bd2fcd

  • SSDEEP

    768:SIbl+bvIZjG6FnYM51xtmvd8vRvweIrFQ/ciQGwxV+3bAg784T1:SIp+0UIH1xtg68rubmc1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\595badda8c15300b8a457f857eaa5bc9.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:396
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:396 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    1bfe591a4fe3d91b03cdf26eaacd8f89

    SHA1

    719c37c320f518ac168c86723724891950911cea

    SHA256

    9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

    SHA512

    02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    0031ab061d23dee4dc095aeeba98334f

    SHA1

    54b84a40d8e936588f6088b1ca1298c9dbbdaabb

    SHA256

    85bdb04be7d2346144b097b7d8afdabed26723ea05469b90ed733bfc66a54c45

    SHA512

    8b8bcd2507904c34ae0c6b462e2efe86871a01e30083580c17f3c9ae9c8c4d66ea8cc3b6c2a5c22c10d888097367eb46fd8e0e95408b37990d0d521de444911f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D4833A776DC900921D903505EECF9B9D

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    302B

    MD5

    4b479e763e47fd67b4688f34eae099ba

    SHA1

    af594972fd8d4605f13a46b826e4e3d3139cd500

    SHA256

    4d29a3a54895a416969396aaac63e5fc412ea6af72d0d89c0ec66b8261b87046

    SHA512

    b6df8b98f5c2d50bb4aa1ee83e2f6ddee7c28a1fafc706e817a87ab45e143e9211f48cad6c01e398ee4413a1012bf8352a6320417b0a5adfb7896bfe5da9ea71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    8387f7461926b7b728baabfdc69382da

    SHA1

    9097db24aee5cb1142c379c7914cb3cecac1853d

    SHA256

    93f388302cabfe45fa9984fd87fe861327a9c2bd5231c21b2e951cf029a2d73b

    SHA512

    843a2aab18c5a2e4df54adb4d855a85668ed75980d16c7fa2a9de420ca650152fc7eed7c6b26f513dbae78921f58ecca0b9d9ec9c4922a427843b27f3e11d9ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7C34XGPV\f[1].txt

    Filesize

    36KB

    MD5

    df97c24c521e648d32bf264bdd7fb820

    SHA1

    e2d4d0b42a0f255d50516ac3cba4125285be3e40

    SHA256

    78e7f950832190cb425874205fc35a604a9f7685f22cc50dbf7c46a4fe43bc6c

    SHA512

    f3a424bae07abc3de4ab35721be656114eff651f3a0599baa4f23fd5dbc95fd92ad7051be106cecd5c3056c788a41660c3228a041fddb7f04362ff28ee718d7c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9ALL181V\domain_profile[1].htm

    Filesize

    41KB

    MD5

    e41e6483f26f01f8aef9bacb62c42df5

    SHA1

    33faf1b158f91462d26999567112fc0a2455284a

    SHA256

    7d98c5e0f925fce9015b230a88cd2412248bdc86e2b2238005ef9159e0ea7075

    SHA512

    3eb3a91749ea1b64b1c046c022627b7e9b8b309ca6eacf7c840f6d10e53dbb8941b69cebbc149806b06b0c39a4685410632ecf386759ae1a7efbb03e8bd7a86f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PZ64U2GI\px[1].js

    Filesize

    346B

    MD5

    f84f931c0dd37448e03f0dabf4e4ca9f

    SHA1

    9c2c50edcf576453ccc07bf65668bd23c76e8663

    SHA256

    5c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584

    SHA512

    afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Q15AV1NQ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee