Analysis

  • max time kernel
    119s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2024, 15:38

General

  • Target

    6fce28979dbd4ced4ebefef1d5600b95.html

  • Size

    10KB

  • MD5

    6fce28979dbd4ced4ebefef1d5600b95

  • SHA1

    31faaead71dd9d7c76046a2e3ba746d977a880ed

  • SHA256

    dc97d0751f4e3ea37a2557518ed0d2d1265401fb97ad70ce05eee2331d6d630a

  • SHA512

    be31eaa1c3e682285709e906d7080d974f3a0d6b3c2bd6f9f64a63bd25738286daad5eedd08803ed8dc87e96b7b137fabcda29f9a676970adb7b1d8c0bcbbdc0

  • SSDEEP

    96:uzVs+ux7zzLLY1k9o84d12ef7CSTUYGT/k0xpFPDiQkg/DkyxZrLkKlVHcEZ7rur:csz7zzAYS/BOxSg4yr0KPHb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6fce28979dbd4ced4ebefef1d5600b95.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4872 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    00c810ad5af9bb1ffa13d83698695136

    SHA1

    356ae631a77f5b6039531fd01904a27e8d64fd3c

    SHA256

    646abae3e23a04a2e487d6811e6fa2f65666e86f650baefcd821f45737165854

    SHA512

    b7335f7b5f9a36999e5eb128f839ad8566c50ef9922f19ddff691266c745faa72a8ecedc97de3e91aa7be7e99df3c4928660f147aa1c9dd76361eb2eb2b1c3fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    aef01702cd9e6d46cb3aaa3773c699bc

    SHA1

    48d062206b64a64ba4eb33e1248456a0ae900f96

    SHA256

    9acfb8902c18e0175303a91e453119f92bc2e3d1db7776a58a7604ae3ae7da76

    SHA512

    9eb86e64e2f1863af0e31c32d884e612b5a894bd9448148ed5b9f118abd5eed0cfe11449cf8f50b862d71d5cedf24ab6eaffdcb746396d71d9570a0d2f57388a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QPBAQNGM\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee