Analysis

  • max time kernel
    137s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 08:43

General

  • Target

    71c6c9e2bb1de34f2b8a802dec018ccb.html

  • Size

    57KB

  • MD5

    71c6c9e2bb1de34f2b8a802dec018ccb

  • SHA1

    4f60cc4fc787f82cd2bb19e29cf4dacafc6a1787

  • SHA256

    e1315d102c6922069c0a8bed87f13df0d3fb34aaecd91e242a4f767b09655ba0

  • SHA512

    e06f409e018184b27ca0b3a37d8ecdec72e415d8e94b14a0e94aefc9192c884cd18a6fa592f3c83729526f59a9eec451ba3c2e3b0fd2bb0eec9e2e53f64a28c1

  • SSDEEP

    1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVroB2wpDK2RVy:ijnOPHdsR2vgyHJutDK2RVroB2wpDK2m

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 63 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71c6c9e2bb1de34f2b8a802dec018ccb.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4520 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1448

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\64E544B76338020D780BCC40A2A2B366

          Filesize

          5B

          MD5

          5bfa51f3a417b98e7443eca90fc94703

          SHA1

          8c015d80b8a23f780bdd215dc842b0f5551f63bd

          SHA256

          bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

          SHA512

          4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          f3990afbcdf64f1f806d1b926cf35b3d

          SHA1

          da1297f9ac1e9e9e7e78b567006e9248bfc212f7

          SHA256

          48c214dd545cc2718f7e844d699efae28f80d683340959e000bb41ad75dd6386

          SHA512

          9b5bc750b2e1038c82a93d51efe0d7dcf951ca594a62a90bac0ca1019d232afd07f9630e1ba1b609e128a9ba9c23c1ea8f1badd9e6b25f3eb591a936c89ee939

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CF14D1855652602540DFCFECD21854DB_54588CF5E8C00DAFF481CACC7AEEF6DA

          Filesize

          1KB

          MD5

          8388a917ddbc889a7ee4ec0d7e617ef8

          SHA1

          626f7b13dca1a64ed974c9c5398af4e4216fe954

          SHA256

          4c02304d82084feb641755ffea6919179f8064b51f60388ec148269d88f4fc6d

          SHA512

          2da553328dbde3ac6a28bcbc8b924ba2c09eb15d87028f01b76c0108cfde7f76ae4a1d63c68343835954312198e9fe792659cdab594390049246de3ae98668f6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\64E544B76338020D780BCC40A2A2B366

          Filesize

          414B

          MD5

          928696845cc63bfaf7d62e21fbd2e617

          SHA1

          b64c90c573b04e324d7bf8f4549029a290510d18

          SHA256

          9397998984435a875fb1f698b4e6855d88ed79a160a097a55970068145734fe2

          SHA512

          48a729eca0f1416aacb1dfb48c5d3e83e8452c970e345981f1413fee0319439dd464b480f28f26cc336b64c420febe8323469ad6b8cca03c2b75d33ccfe38041

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          f98b36384258b797f7cc4edcadb84d86

          SHA1

          8fa07d984c15cb35a63f483bf1d94c29f0b13273

          SHA256

          64bc312acab18968480babd077a61e04798151039c20d2b065f123239e24a229

          SHA512

          5d7d045c45c417cd959e9f52ddb10af7011df98014cbe3d7b9fe3bca80324510472e4a761a9fe25a95dbf6cade9a1088181ebaac0697f1b55125f0f2b7933879

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CF14D1855652602540DFCFECD21854DB_54588CF5E8C00DAFF481CACC7AEEF6DA

          Filesize

          532B

          MD5

          1e2c66007211e524dfbec076a92b931f

          SHA1

          d6ea92b6eb816ecd1c132f0c14ac68c05e6af974

          SHA256

          0641378f680334b8fb7c66b41bee7d6e3d23e31151e81157048b815a662cbb70

          SHA512

          ebc8d3de3f9922e12b05fb2755f8676d1ba13a54a1dc9b9f10c9e7d1c1b04bc5945be20c0cdf2e0abc71e6bdb042cf8d639d68e437dea5a883b85583c5b1d1f6

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\RXWUHOLK\www.dailymotion[1].xml

          Filesize

          13B

          MD5

          c1ddea3ef6bbef3e7060a1a9ad89e4c5

          SHA1

          35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

          SHA256

          b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

          SHA512

          6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M8F18HYR\f[1].txt

          Filesize

          36KB

          MD5

          ecc08d57faf7050170be60ca0fa6920d

          SHA1

          3a233d3784f0a20ce893cc30ae6ab5fe789cfa52

          SHA256

          7ea897ea4f42f9d7be78c7bc33281c706d771f7094049562fab312fb0aaf6055

          SHA512

          8c5eb3af8072fe5f96ed1d599afdf7e9210e2467a966726577602eba3c4c250571bc3c11640795bba5759eaf590355ac0444f30b2beb65b08cc89de97982fd97

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M8F18HYR\mem5YaGs126MiZpBA-UN7rg-Vg[1].woff

          Filesize

          95KB

          MD5

          dd482b790e27ef56d5bb00a5d1fcdd6d

          SHA1

          4f6d7bf62181a9d26055547a63c6ba67a5e8d7f5

          SHA256

          923a8e3065efb9e594320e03cc5cc5e343a52e60ab2be5b717b12f000aad36b3

          SHA512

          dd3e0e4884cf8e33bd1b0c9a7802e88e564c4fd8655d898ab1f4aca7a990b22cc46f974052d1f3c33423ff1e5559b01fbcfa9121d8d84f10b74f696b715dfcc1

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M8F18HYR\mem5YaGs126MiZpBA-UNirk-Vg[1].woff

          Filesize

          95KB

          MD5

          b4f76501db86eb7c731e0437151d304f

          SHA1

          8d38bab451d52354bd5c90a674f34bbeecbed3d3

          SHA256

          058795c57ae91386a93956ccde3b5460a120fad962c2b08ba79bbd11a9d934a7

          SHA512

          f661eb9acc27f471912b3abfd1cac126f03f061fca805fd36c1d2e40fdf148e96bc19ed34a8b755a18463e91be66f30c9484989b22247c55b6e780d68999cd4b

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M8F18HYR\mem8YaGs126MiZpBA-U1UQ[1].woff

          Filesize

          93KB

          MD5

          86f83cc557017c273dd44fa39d78a341

          SHA1

          8272d698dcfec3b10b55f3e6fb780173ea350c53

          SHA256

          9efb74ddc9821218bfaf7b5c2c8a3e43767a1653694c69de918b9fa503ee4ce4

          SHA512

          0d2ffa33b73d51861239512abd70038870d5385b910806f3fecfd9470af865dc708bf422d4ec0c97becf9eb760cc759d60cf551cdf0ff5a01e3010d9e9e6fbbc

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Z0UNWU5J\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee