Analysis

  • max time kernel
    129s
  • max time network
    295s
  • platform
    windows10-1703_x64
  • resource
    win10-20231220-en
  • resource tags

    arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/02/2024, 03:59

General

  • Target

    d8bbe0a067ea4ba8942b6144bfd09f7b2734e1be37d12cd654c1d8643fa11cd8.html

  • Size

    380KB

  • MD5

    f7f31df6863df03d03130a368cf8150f

  • SHA1

    25770c21646e77a6289d160f1a58185fd03eebdf

  • SHA256

    d8bbe0a067ea4ba8942b6144bfd09f7b2734e1be37d12cd654c1d8643fa11cd8

  • SHA512

    bab0b154f003c6c45f5ea15575fd8696fb4afebdea122fb3ece619bd49ccf60a97d90144d3bb4f4f184719f89675bc274335bc71957c986d978f7e8479d80fc2

  • SSDEEP

    6144:w3QTulG1TgcXpwXnkZi7Gyhkyr5hWxIOOQ85dx6c2:uc11TgcXpwXnkZi7Gyhkyr5hWxIOOQ8i

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 59 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d8bbe0a067ea4ba8942b6144bfd09f7b2734e1be37d12cd654c1d8643fa11cd8.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:204
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:204 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:320

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          52bfc02b370f1b48b834ce1c58ad6560

          SHA1

          d3dbca3ed04caabf69ec8d525a83cde0919809cf

          SHA256

          fce02a7cb2ed194e21949d8a394e69f1dd30c4c517addc831018b8a0b7235a97

          SHA512

          5fb4c1b2d4173f5de1237e2fd55b9081b99756217d5d639da3e0e1bbe339d87be2e9b732ef783446bdedee2af8730e4bedb3184d58ba0bce0881ddc199495289

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          893115f8ca0b82eb8d9da115eeca9ee0

          SHA1

          f92a8e014b15155cf7d56d8dda59392afc3f89df

          SHA256

          cd9b6deeaa118624d0f6c201a0b4188c79bd58b56830b399e4cac3e10487a6f2

          SHA512

          6c74f630db93fbfef0ceb2ab3017d3b79b192825f6e0169b7f0429333931126bdac404ef13ff3db6677f7b287739bb5fa8843c74376d8c3081423d742d1645cf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          627625b9541604d66ebdd5d729b1d174

          SHA1

          9be4531e7d4dbb07153e0b8bc8cabaa536daf853

          SHA256

          db2a127ae3789e1de5718448d2b2f30a6b6fef5bd07662ca4d28697f654d7077

          SHA512

          36c9fcd88594039138ff29082732621b0f79aa94fd8a77e6eb6818f448be9e4fe4c311bba275baa6f563ede1f32773f5946b4d5cd9a8ff82cd61511581200a42

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verEC83.tmp

          Filesize

          15KB

          MD5

          1a545d0052b581fbb2ab4c52133846bc

          SHA1

          62f3266a9b9925cd6d98658b92adec673cbe3dd3

          SHA256

          557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

          SHA512

          bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6NB6O71M\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DKSSSQYZ\site_layout.43d06ff5b2b2908117f7[1].css

          Filesize

          422B

          MD5

          cfecb8ef6e9c75e4a39397dd3bec8438

          SHA1

          d6be820385c161cad93de0b73d37528dd1c960dc

          SHA256

          b81eb89bd6746d7dd93586ea983ac075bd6d7e2dde632a7c722d5f9eb5301233

          SHA512

          a726490a3765408166e183c62c0eff587478a94ea00ff72bc959ff9ed37a1cbdb5d0f7fae53b7c894e3e402cbc889cdd1f4b07aa5b4c9c8320922d7ec07d6f23

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\XA5L0GH1.cookie

          Filesize

          545B

          MD5

          3db65764018fa02b2ed9fd78d5796ab9

          SHA1

          3fb4f787d7c395973b0f14cb824b12af181daafc

          SHA256

          03d0a6c15b3c430e9671cf709bf673b2b6ea0498ab1680021cd3127d6d140428

          SHA512

          5955a2dce98ce1e4e2ca5bf3c623e8e97ed3f312b81b6c292fa0748bab5ad93f8bbb77b504af0231da3adec421795607a2bcd9af5f7a12655d34a7a11e98deec