Analysis

  • max time kernel
    145s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 07:26

General

  • Target

    864a69865930043ddd25cff9d65fedb4.html

  • Size

    77KB

  • MD5

    864a69865930043ddd25cff9d65fedb4

  • SHA1

    69dff82905d2b50e0e8ec81085135f1b39a80b80

  • SHA256

    6ec7b262411b22c360d68e43954e3b039add112c74db71df4b2185b680e0d8d8

  • SHA512

    feae87007229fc2175dcc264b0dd129591fe95406ef03645298709f04b98efb32f9cba0102267b9c01dcd3f62b91d7ad099bee76f3204fe0748297227f474cb2

  • SSDEEP

    1536:nfcWlPdW4OYj77HHaeUhpQ4fulnwu1kZGXW38:nfcydW4OYj77HHae5FX28

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\864a69865930043ddd25cff9d65fedb4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    bcace81d477f3c718f9b8caa06bbbdcc

    SHA1

    966f9283be355a4397633243c28a26ace4f8f5db

    SHA256

    536e164c1bcbbe417f805d4d9722d6e8d934ee957fb54bb0a1faeb65336f6294

    SHA512

    99e5175ccc544a20ce6a1d944002ceee21022eee15c9815ec61fa51785480ff43071c239c0fc9ccbeb0a036fe1b7cd62a4f45b1d9e30da7889410e26f747b679

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    724B

    MD5

    ac89a852c2aaa3d389b2d2dd312ad367

    SHA1

    8f421dd6493c61dbda6b839e2debb7b50a20c930

    SHA256

    0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

    SHA512

    c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    28a2ad2479c55bbd380f966351559b5d

    SHA1

    1d2fdf8559b5e35ef9a66cd7179ede8476be1330

    SHA256

    d7b632caafc8d466ee7d7e31e0ac2d2bc2af402bd8cb72eabb349dfe37fa7f35

    SHA512

    6f1e2c68838e28e25de558745c9ef2467d03a83e5def14f92ac9bd24d2aed643047b365d7ef5e6a4b179f99df9e1e16269cde556493e18dde6f798785bb2906a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    392B

    MD5

    2bb2e7e92c51a3f6ceb9b055359330d1

    SHA1

    0c2d06541afa9a76291fe1816e482734d2af29c0

    SHA256

    a0ccb518ee15f5ef875ed0f680952c06dc0c5ed62e0c2533f95d70dd7ff4907e

    SHA512

    d60f319f1238446cd8350214e1740bfe7f299a57bdfffa0b6be21657791085c10f6d4533dea6b85cf5a2f42b3358d51216dbdea38d2f65d3cefe38a21855e609

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xml

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GUTCV3OF\f[2].txt

    Filesize

    176KB

    MD5

    5362e522119ad5e6bdfb5ed82db61644

    SHA1

    0253ab5b2ab01ba34043e8cebca3d42311606d2e

    SHA256

    723d6a919669081f5224dd4bd19ba2a54e98acbfa343c20294162034607939c1

    SHA512

    0b1fd39290372eb863f96b48d7fb4fc7b21aed164f19846a61db2905f258bc49eeb8e02cb5edbb13f570972449f77cdfdaf90c04cd99544a27314e296c086c0d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GUTCV3OF\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\OO2Q27PV\f[1].txt

    Filesize

    176KB

    MD5

    2748fcb19009e3b2b11ac30631a2424c

    SHA1

    03524ea1d60540ac84582c699c432cbfc5e1f013

    SHA256

    13a1202aa27866cebc729a25a977c0af8a8d9e181525007696b2cecca23a4051

    SHA512

    c442ea79883c14498f8916d823d4f22ea975ddd889c6a68a88a1cc25887280eaca5884952ea395a4075074257e827695850214f96b1f8f3638d91af0d7ab6f60