Analysis

  • max time kernel
    114s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2024, 10:37

General

  • Target

    Make a Donatation.html

  • Size

    153B

  • MD5

    27fc263dd490d556c90c717604dc5d77

  • SHA1

    f549c91e997c2c947379dcd69cfbab124b224f09

  • SHA256

    a8e23c34125f4177edf24b177500521917790ca1e91cd57158e355675599b227

  • SHA512

    22362d3ba5caa67061cb7f5a1786df697557c2a3b632dedcc65a312367e3c8f847d18b9123fe7181fd471f05dbd5d4dc231add3a18d278f1953760e1eb2d8a19

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Make a Donatation.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3464 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    00c810ad5af9bb1ffa13d83698695136

    SHA1

    356ae631a77f5b6039531fd01904a27e8d64fd3c

    SHA256

    646abae3e23a04a2e487d6811e6fa2f65666e86f650baefcd821f45737165854

    SHA512

    b7335f7b5f9a36999e5eb128f839ad8566c50ef9922f19ddff691266c745faa72a8ecedc97de3e91aa7be7e99df3c4928660f147aa1c9dd76361eb2eb2b1c3fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    0805b372eab6dbf98be432c0b7481092

    SHA1

    5458b3ca5f93fed05153d7304601077925e603d1

    SHA256

    8a64492a978631757696b7b8f4ff08c6cb924cd425cea74ad54d42903c21aafd

    SHA512

    4f95c75033d71a5eb35d4ba30ab1ed82988f040981379f1523aac17b0f2ece14b1c4b1062aba13f7b3fec8e24d762eeb24ef6c44869ee17779d1adac6c500eb3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\2OH9XR2C\disqus[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\2OH9XR2C\disqus[1].xml

    Filesize

    239B

    MD5

    a68c888f681f8b5f70d63979713bf044

    SHA1

    a70387647f92dd1ea16fd4795d9ccc2fe543b9a5

    SHA256

    8e7519dc32936fbadc7aa15f5fdbff33ce2965f266e0ebfa06fbfe925575c718

    SHA512

    a2bbf19e68fef693dad44e85592bac4a37fffdefefd3e520019c2024ef63beeba74c2ca80171a83ef34b9ed93764fcd0b8ed21617924cc6ef0c0e0166211605d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verC350.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9owjsyb\imagestore.dat

    Filesize

    1KB

    MD5

    7f938f5706f8d6a7dc211ecae3d7742a

    SHA1

    369f44efe7724f16dde3bc6679876ff162ed003e

    SHA256

    f4ed6659f22f246915779ee5ce4e395dad3465ab18a1e9bcc89260a030ad70a6

    SHA512

    cf10933c6701e2ce127391415afaf94e40560926347b0d08a9d506e0ff74c0ebd66ee3cd342dae39b745e10c5a52f7231588a1ae6a5db8b6811ecf57c946a83d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\SB302YPZ\favicon[1].ico

    Filesize

    1KB

    MD5

    6d9c08ea15105a49c607e0f4386876cd

    SHA1

    cd1711dedecab961c34e9fb1a60610642128778a

    SHA256

    8af0d7e7f61925c6075204f767f9e96bcd9048c9cc097276da805fef1d5206af

    SHA512

    e65657cabd125297d9b78058c492a24e4e035e6baf8d2aae4326d5bc34484fc30aacb8b02dd9701a1c6ba8b3248a5bbf5c59000c30248069962f517870300b5e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\SB302YPZ\index[1].css

    Filesize

    47KB

    MD5

    25ecf48402a2f38013ee4c9a51e4c61b

    SHA1

    b5b9c6383fd0670e18119ce2e617b3bf573e2608

    SHA256

    f223b501bc77cb00c1213bee7352dbdbb808a8fd6fab3542e4401054683032d2

    SHA512

    e9f573782adde2ab0fbea99f85767216c0638a28d1afdd82e9035c0dac85d51e6d5fd10de31b79ad0254de9304ae805e7611836ea6e14668c4e884c102aff2a4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UG0DPB4T\mg_top_reads[1].htm

    Filesize

    21KB

    MD5

    a1a0110513e4754fa5689f79e1217dd3

    SHA1

    db440138f6379f4fdc4c75e9f4d5d56b1e92b403

    SHA256

    74fc3260eaf586ef36538e4c473d5a9f43d2ef8c66a31d750828b51cf41bad86

    SHA512

    31fd8129c076f0d80cc1e2c3cda1b06b250ba7259026fb2beb4b01a580ed22452ac775ecdb9d80a3fb6de1331f3edb03c7f3d383312069c5929672449c58c94a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UG0DPB4T\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee