Analysis

  • max time kernel
    135s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-01-2024 03:54

General

  • Target

    66a14748c15ddd1a0f74d22b825195f3.html

  • Size

    45KB

  • MD5

    66a14748c15ddd1a0f74d22b825195f3

  • SHA1

    4ea8a41829fcc2794023e91f7cbea18d23978a60

  • SHA256

    350a2411588e7b6f883db2c8abe41e8f3b5921f2ab797ab3edc10414a9152c83

  • SHA512

    52c0676bada866ad08c9077e756cc77bb984c56c1bc278a6d3c8ce45f8f54e87ea375223e7c7792e6e119e31e49622b5bc9a779012c81ac0769098cefab3d496

  • SSDEEP

    768:OuqQyYSnz2fo22DuZlPz14/2yhZlePs78bKJCS4G:zqQyZQfqlePs78E4G

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\66a14748c15ddd1a0f74d22b825195f3.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1220 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7V1N9ZS9\842e1500f0d6013830d48082328f99e8[1].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8D1Z5HG5\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UCK1SA0Q\ad516503a11cd5ca435acc9bb6523536[2].png

    Filesize

    582B

    MD5

    81e90ffc94c70927623d040576ce2ec1

    SHA1

    5d31d190e33c5d897543299cfab2e2e8b68ada95

    SHA256

    4c491f84d52e764dff27e199cdc9bdae57d489c6f4d78d2c94fa7773b4fba7ae

    SHA512

    e039fed09d43670dddfa331502c33be6213c5b0d1f2135f736a855f05648c002930a600d183285ce37c0b7321ae03b98deb16b1e013597ee484f818a3b23e5b3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UCK1SA0Q\px[1].js

    Filesize

    476B

    MD5

    d2183968f9080b37babfeba3ccf10df2

    SHA1

    24b9cf589ee6789e567fac3ae5acfc25826d00c6

    SHA256

    4d9b83714539f82372e1e0177924bcb5180b75148e22d6725468fd2fb6f96bcc

    SHA512

    0e16d127a199a4238138eb99a461adf2665cee4f803d63874b4bcef52301d0ecd1d2eb71af3f77187916fe04c5f9b152c51171131c2380f31ca267a0a46d2a42