Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 19:36

General

  • Target

    68768de9e6905ca0080f1e8591ecfd8f.html

  • Size

    45KB

  • MD5

    68768de9e6905ca0080f1e8591ecfd8f

  • SHA1

    e4555c8b4a0d70804e0e2ada61d4730b6f0b2caf

  • SHA256

    3bc9ae7c65e9f61ddb693d632b0dce9c176ca15bd285e698462e73bac138b06e

  • SHA512

    35fd44b710deeb37d6fcfae337a80aaa2d24bb2aef065fd9a5f5fc6b23bf3e25c330b2faa563ae599d878c69da87345a3f7c5211cc167a912d7c946ec98526a3

  • SSDEEP

    768:SfaAncellml4+Va0andZEACANu7QeiwwmGXoJ0r8w7HFH3vQzC4NC4+yC41CS7C5:S8AvEACANu7QRTnXu5w7HFHIzC4NC43q

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68768de9e6905ca0080f1e8591ecfd8f.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1400 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2368

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868

          Filesize

          471B

          MD5

          14769cf17d472bfe5256a557ca61505f

          SHA1

          e5d134f870df2ce4d22d79378b0227dd17766077

          SHA256

          63b0c6b84008e680555d3d3ab48cbc059dc3c6dc52043e4775273cf8c506cbae

          SHA512

          7f1eba378aceef87bf62444a5a0f68379ba91e018f17bc002a998327fc8a92d92a7b85636798ebf24e7f21d29bb4cc390c6473087e6056cc05acb778bfe53a23

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868

          Filesize

          412B

          MD5

          b1760503d3128fa96649bf5d6af99352

          SHA1

          4e26767a3f2694a043cce0db5e5c9b3a3abc5c7c

          SHA256

          1ba268623b38fd0ee9a9492523f41cccdc41f2481cd8b134f125231d43b55c9e

          SHA512

          b15f96f54e7d34a1fda5646b304a18ec554afca626b5fcda9d0966cde2e9b984dd0d5eee0091c05f861efad106bba26ed2a3cf40ab9e449837c2e7cd49c68096

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee