Analysis

  • max time kernel
    125s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2024, 18:18

General

  • Target

    7af00206b8553404943fe66b839fb45f.html

  • Size

    82KB

  • MD5

    7af00206b8553404943fe66b839fb45f

  • SHA1

    d6c0735977379035eabdf096dbcb8ff77f74ae96

  • SHA256

    2b897847dc49b91a477752d1d8663021b526dc6e978a16a41f58a62e6972a559

  • SHA512

    fc53a8e41a244dcec7f64aef4696ae51e2667c3d604d9aaef9d7e414454ad35a934d0cf2f7584c206503042dda43805d0d5bcc358e80a07fab19b50f15d5fcae

  • SSDEEP

    768:SIrX6qrEtZKqUfKsPXZCxPgtmpgiH4wcszid6lFnj+r47kLYEcVi:SIj7rEWvYxPgjifziU+r1r

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7af00206b8553404943fe66b839fb45f.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1004

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\553BB2DB537731CDE7E2C9AF02BF1866

          Filesize

          5B

          MD5

          6eed2d504c5c297e7eab521509b65ab9

          SHA1

          bf6986926193920da2ffc5e9b6f87b5b68e959fd

          SHA256

          f302d17f5177f5e0f95988efe685b25a07e95687dab4d88a960ee97d40b60cce

          SHA512

          d40ff3325d19431daf25603779fc340f5cbb5b3d3ab060a85fd68f464f4a306566cfc58939a2825ca1587a0cbb6d37b7d41f60da84e457056c6fe950656282fa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          55adff48fbcd7763c70a0d51d485d24f

          SHA1

          8ba66cb09d8e16d22c35931083d443155d3a04fa

          SHA256

          801c05af90120efdf31e4dfdcc5e7f2b76b9ca0e0746f58fdf12bf99287d8aca

          SHA512

          a3151d562469fd2412c237bb5646bb214a9a9f8664be4eb48fdf704d9710872e41947669f770ac74d9d1eb5d6ea5953e40cc5a85d57e56fc82708341154eee7b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\553BB2DB537731CDE7E2C9AF02BF1866

          Filesize

          394B

          MD5

          845be7c1e3ac06a3b9cf9eb8266c6f14

          SHA1

          048589466565a32a16a49f8380687ea7dbe4f63d

          SHA256

          6e4f2fdb2ca104cf7351b4c259b7475815409fadb96e7c0166645fcbb1ff0cc7

          SHA512

          b257ba56efc1b2fc4ee8f8999a0c5676a7febd2b85b3a604eeb25e98da00e37170de4e8e04c9667263a292af4e36a29b79a8d9960273534745e3369222b41f2e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          1abb4078dd1384b307ea5755df62971d

          SHA1

          5c12b07856fdd05f9f06feba932554b628a2c18c

          SHA256

          0cd610e0518fba141d0ccb138018eaa6e60343a900cf85c10ec08a50a8d7cf8f

          SHA512

          5c3ee445439f75b8d486f120ea663c6d0d312a75bdfc473714f0a2561b0fe4cbc8b9abfc5a9e5f50d224879807a47c6cf8a31be56f74dcbddfbff94e97906d96

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BJCNBC62\cb=gapi[1].js

          Filesize

          64KB

          MD5

          ee01651d160cfc55249d6011a3c45916

          SHA1

          79d6121df6575974ad21dafce33ec98e3f2f0a7f

          SHA256

          639d75299973c7d3794eb7eb129e3b5a6139f9f521e1f14383abd0fd501219c9

          SHA512

          8a39dfc1ff2c58ac106225976aafdaf7befc0a28903a0c65e2c272e1967c3336af2b477ec12604400bb8e16aecee6567c9cb9d157e3d54649e28b9b2f920432f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BJCNBC62\rpc_shindig_random[1].js

          Filesize

          17KB

          MD5

          f019fdda31635d2a31b151ad8ad56c7a

          SHA1

          6adcbec55f66ffaef83d9a134423aa98eb2a2189

          SHA256

          c7fc0b1526533002c956ebf8e8c42c3ad3f96c41ace73fb4063cc89051944831

          SHA512

          fc278c12316e098976833882a38c788d812f9d36bd1b9b2b8c87dab4dc906af26a860df95436ea1b7d509236d44d0533d475a153437f8f5d42653fc28a77ad64

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QSO8CY24\478691279-postmessagerelay[1].js

          Filesize

          12KB

          MD5

          92169c8a0fbf6e404267d0705cdbdf42

          SHA1

          a5cd88b74ca5ced239cdbfb458fe25540d671f46

          SHA256

          dba668b49a111527aac8f616b9053ea57c944e01a84ebdcd02a13da921223384

          SHA512

          8c5d35ea512fa7be367cd9a9ded2f23822dcce730e5502a355ed0d48949ef763eab13be0d50a66de6b0f8419d6a002c12c4ddbf20d97f5393ba922e48a4f02e2