Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 10:52

General

  • Target

    772a90f42ee579b4fdddeac26442519b.html

  • Size

    57KB

  • MD5

    772a90f42ee579b4fdddeac26442519b

  • SHA1

    7761dc9ad31636f86cca69ca27c7d074f8fbde60

  • SHA256

    e465b0095e38b64847217439b7b16db489d01e4d791f6b591687b2827033088f

  • SHA512

    e874765a1fc1f7205b1e7f00bf2ed352c7105f696a7622c9a7685bf6ce50590f3b75ee65e6d5d29ff8e513551ceaafb8cb836d2f65d100e4fd7b732e161dfcdf

  • SSDEEP

    1536:ijEQvK8OPHdsAjo2vgyHJv0owbd6zKD6CDK2RVroj/wpDK2RVy:ijnOPHdsj2vgyHJutDK2RVroj/wpDK2m

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 63 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\772a90f42ee579b4fdddeac26442519b.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4252
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4252 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2764

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\64E544B76338020D780BCC40A2A2B366

          Filesize

          5B

          MD5

          5bfa51f3a417b98e7443eca90fc94703

          SHA1

          8c015d80b8a23f780bdd215dc842b0f5551f63bd

          SHA256

          bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

          SHA512

          4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          b610bd5c61e2121914699e4b6cb9f7f4

          SHA1

          514f5ad7770f18e1c5b62253d95d6aa3c63c83ee

          SHA256

          3a418958f81aae04aa13719238c42d24adc5258b95246b3df0b32a1bf7676b51

          SHA512

          9ebb50a5b4942dfbf1a037e8a1b6308502d5bd337abaf90cca0d44f3a88001b25c6f82787f13b2d5a6f2bcb81209f831c16422d4c1a6cb6e07d55e8dccd7b3b5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\64E544B76338020D780BCC40A2A2B366

          Filesize

          414B

          MD5

          d2cf81b7bc1a936d102f99a4412e5648

          SHA1

          d49fa4f9ea591f48c6deb83db65733c74c7e05a3

          SHA256

          f021cda03b55349f14edc60b967f2528d4bd3d843fd9df84f33f6f72397d4d64

          SHA512

          65f070ec4d8a9516d1e9d39e745ecb4cbe6a4f547b563424d50855316bf1ae7758f4019e4d132b50c60dac0604a3e821b73eb045cf99ce39a5193ee4c74ac243

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          1a7501f8f44590d3d2730139b33e71b4

          SHA1

          3213be394606d05b79fc22d100822b03f275e24f

          SHA256

          7ba8cf51e3b8bcfc92fa8b0a4e633e3423d3386230c2c649c326ba5a6d0f7445

          SHA512

          7d3c97db4669c0ed9a733a1fd466f19b519d8eddfff6ebfe5c22b328a1a00ad0044fd6ec15ca80c1a6bb9f4a823b50f443e9b26e0237e16d345d11071cddb41f

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\06UOC1DP\www.google[1].xml

          Filesize

          92B

          MD5

          d9db96c08d36af24174fdecb01d0d23c

          SHA1

          a73141d239155f2f4c4d34741106f8c48725850f

          SHA256

          9f4f11f3f71a41cd5901b5b0856b96452a832c49940127fd836fbbbeec4811cc

          SHA512

          fc0fbf9995b4cc2d711fcd1d023d7799f167e00713e551e33e3a6de8d6244c1c55792c958f68e4ea210f6d76dc1a738614b4f07e2331798db46adac2a0e90dfb

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\L47XVL21\www.dailymotion[1].xml

          Filesize

          13B

          MD5

          c1ddea3ef6bbef3e7060a1a9ad89e4c5

          SHA1

          35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

          SHA256

          b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

          SHA512

          6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\L47XVL21\www.dailymotion[1].xml

          Filesize

          166B

          MD5

          e974833a7b13a9470ba917a9fbc9d161

          SHA1

          1aa5f183bbde91a131b2ed6d5f5f78cc357803bc

          SHA256

          ef7a335ad4e3c837989a9224460640d21a238d48a814f235007969a860e6da57

          SHA512

          9a5f3c5905b1ed55a1c0c06b34652b05ae41696b5d45cf8f88e934ca7fd4397a93a474803d93cd3a0eaa2f97fb5fc687222a1685c513fe1f5bde5c87a5bf6a52

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BJCNBC62\mem5YaGs126MiZpBA-UN7rg-Vg[1].woff

          Filesize

          95KB

          MD5

          dd482b790e27ef56d5bb00a5d1fcdd6d

          SHA1

          4f6d7bf62181a9d26055547a63c6ba67a5e8d7f5

          SHA256

          923a8e3065efb9e594320e03cc5cc5e343a52e60ab2be5b717b12f000aad36b3

          SHA512

          dd3e0e4884cf8e33bd1b0c9a7802e88e564c4fd8655d898ab1f4aca7a990b22cc46f974052d1f3c33423ff1e5559b01fbcfa9121d8d84f10b74f696b715dfcc1

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\f[1].txt

          Filesize

          36KB

          MD5

          cea954b188385d70bc12d1cfd343299e

          SHA1

          c1943ca73807df3d9cd4a87b9a3f1989c9cad1ac

          SHA256

          d3bef851c0dd16207ed0f5474e4c0e7034c012cfa3ece10c3a992753bd2a80c2

          SHA512

          d4467ba7dbd274d55094c27b1c263b82c19d97b543f759b32f810fee599a573e2e71a68ce39764571f39c0d2631cfc72f9ed016d4b92ef4b0971cd8e660514fa

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\mem5YaGs126MiZpBA-UNirk-Vg[1].woff

          Filesize

          95KB

          MD5

          b4f76501db86eb7c731e0437151d304f

          SHA1

          8d38bab451d52354bd5c90a674f34bbeecbed3d3

          SHA256

          058795c57ae91386a93956ccde3b5460a120fad962c2b08ba79bbd11a9d934a7

          SHA512

          f661eb9acc27f471912b3abfd1cac126f03f061fca805fd36c1d2e40fdf148e96bc19ed34a8b755a18463e91be66f30c9484989b22247c55b6e780d68999cd4b

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\mem8YaGs126MiZpBA-U1UQ[1].woff

          Filesize

          93KB

          MD5

          86f83cc557017c273dd44fa39d78a341

          SHA1

          8272d698dcfec3b10b55f3e6fb780173ea350c53

          SHA256

          9efb74ddc9821218bfaf7b5c2c8a3e43767a1653694c69de918b9fa503ee4ce4

          SHA512

          0d2ffa33b73d51861239512abd70038870d5385b910806f3fecfd9470af865dc708bf422d4ec0c97becf9eb760cc759d60cf551cdf0ff5a01e3010d9e9e6fbbc

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee