Analysis

  • max time kernel
    88s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2024 06:50

General

  • Target

    88d802f93966b7449c09ea912756ad57.html

  • Size

    432B

  • MD5

    88d802f93966b7449c09ea912756ad57

  • SHA1

    6856b6bbaf7a8e262e1da5c082dcaf105f180232

  • SHA256

    a385d6e605cc44cf608834ee38ab70da7680250c1b46bb5c7e11495e4a4b6b15

  • SHA512

    a27ecd1af6ab1d0219cc826f0a788ed40b03fb0b55efe1ba24fb3ff4aed60fb8e866f63a9c37fa6f100aa906313d7edd4082220ca67a302dbc42c9d2e0cdd86e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88d802f93966b7449c09ea912756ad57.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3096
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3096 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    164c747ec05b351867ac47fb8ac89dcb

    SHA1

    d814dbedc7356af4d274b907692c28baea48dba0

    SHA256

    e675e63c991701c36625eb6ef0d2e009c743f7a6843192f74bd10ac641503181

    SHA512

    895663660c26f74561154925fd7ef4c2ee7e8fe0ad25985f7ed51ceadb476d576450c8c57aa8e8ea350be398b491f0bb5fe54744d7d1e625e4ab97a93b375643

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    b1d43294083a297c103bafb7c272cddf

    SHA1

    fa0149aae2897a56303ad9feaf9c2244fbccd4db

    SHA256

    2d1b3b25d6112b57b9561ad10d4973d94fe9a4a06760d9ea4ae591bf9309ab7f

    SHA512

    70884e7bc6f4c5e843754366292a19978a22a14a26670c890f1e082968aa326f4fd0a0d82a81e102e15d710362d53153572c7e926f2bf1d9d23907aef5c49506

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\flj0k7l\imagestore.dat

    Filesize

    1KB

    MD5

    5a884883eb7384c6f466a54ecaa4db7e

    SHA1

    ae3373385023db5c0e0eae56a071637c8cfc4a48

    SHA256

    89e5c361926e75e9885328458b4590ce3db535a8813146e868e18acf6bc57af1

    SHA512

    385bdfc434dfdd48d1e95428fdfbcda00961dd4917d951d991b4911ed77827a898a3be5c769286c087ce9021d41ccc449fb03da64b2ca4c965e2ddfda1b2e80e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\favicon[1].ico

    Filesize

    1KB

    MD5

    91abe01116ab422c598e9c8af72cf4da

    SHA1

    0f2815fe8e067d48537ad168225ab4674271fa27

    SHA256

    b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc

    SHA512

    a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee