Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2024 09:55

General

  • Target

    8edaa0a2de0b348a4bb49b5997443468.html

  • Size

    56KB

  • MD5

    8edaa0a2de0b348a4bb49b5997443468

  • SHA1

    f892458388b654acb4ce6ed45c1cbbc94a42c51f

  • SHA256

    e85ef911e14b9cb49fe989a832b547f3bdad06a1fc0d8653c14441eae85d7405

  • SHA512

    c1b5375ded938898f59e7ac2aed15dd86dab49bfefa3a56eabce90a021124709885f786fa385da45e9e00fea79133b3de52a8c5053a7233648c833be3ee2bc52

  • SSDEEP

    768:Zcd9QZBC7mOdM8PpC5I9nC430obKVi/HUkBPd:gQZBCCOdH0IxCE1x/dBPd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8edaa0a2de0b348a4bb49b5997443468.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    52bfc02b370f1b48b834ce1c58ad6560

    SHA1

    d3dbca3ed04caabf69ec8d525a83cde0919809cf

    SHA256

    fce02a7cb2ed194e21949d8a394e69f1dd30c4c517addc831018b8a0b7235a97

    SHA512

    5fb4c1b2d4173f5de1237e2fd55b9081b99756217d5d639da3e0e1bbe339d87be2e9b732ef783446bdedee2af8730e4bedb3184d58ba0bce0881ddc199495289

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    81f735a5a052a190f09753355e06842f

    SHA1

    67ebfd6d50f8db11e897762f6def5809e12a50d3

    SHA256

    293c4f8b36bd7233ac846959c5502882de4e8d1621d4fc773df532c4cc83398c

    SHA512

    e05dfc59e85c2660f1b3143b9189336102b6674a35e7db37f05bb4efc44f1826a54a73128d69b7a8ca58339dde6df6a47f4f93059038943dc133384c54dbd267

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verC2F2.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9owjsyb\imagestore.dat

    Filesize

    1KB

    MD5

    3849bbde12badb1e2cc18248c92a421e

    SHA1

    eaf35cf50c86c0813fef70101c84e05e5fcac098

    SHA256

    6f16a1cd69567d13f13ad12a6e58193322e231612af4d6b29c5defc3d7086142

    SHA512

    ab838dd02facf7907af28ca7558cbe9b5939c0ea5d4b19038b4db19a2c560dd49b3e4463bda35aae8b717abc152a91a24a94ab99e0c1383064bb1edbb8c55b5d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1RIAF1U2\layout[1].css

    Filesize

    42KB

    MD5

    e57c81f3a17073a78a7c3c865f74f89a

    SHA1

    587d7c955432f1e5a87460ecbf9086ae2589346f

    SHA256

    e36f1f796e538f826beb42510edc0354133c61c7f711b827def7f91d3f7c8bda

    SHA512

    630aa9dba2aee1125103954b093af8b24907d98761e1a9b93fb6f6c43abfec3afdf53825e3f12fc3cf87fa14855daadfdbc90b1e49b503fb2917599dd77daf52

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\SB302YPZ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UG0DPB4T\js-loader[1].js

    Filesize

    650B

    MD5

    ea5a5798612df63ab0532174aaf62634

    SHA1

    0f4713eef39ab07510d3703ef201885475ef0b42

    SHA256

    ee44a690e6d7ba27656d9a013b7803d69461a19444d834c918d16c1c56598a31

    SHA512

    8cfd3dc5eb7f2ab4f27abf80bea6955a00112b84ba074cfb8a1bce0207c36f6f12e2f3e90b8ebb8fedd56a5520a4a0d09397af9e6f4885addd890df7bf3b8907

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UG0DPB4T\recaptcha__en[1].js

    Filesize

    488KB

    MD5

    16cb1c02d3183e1026b4ca6b3eb3d509

    SHA1

    156c9649e7a6e78b8fd974cf29ecdfc8c0fe3929

    SHA256

    689c72d7718868395eaf4bbe26e9f52e92f16daaa1d5486b53ae3744a996f1e2

    SHA512

    aea879561c737bb7ce6784f0178b429a19c3b854415d30342db41184ee356cc6f7e138dfd1d7212ae7dbee3a2aae3a32ca2880cdc8132da06def9fb562cc5b37

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W8BIYKF7\favicon[1].ico

    Filesize

    2KB

    MD5

    cb546f0ce2ca2505cbc9088d8a4592e5

    SHA1

    d87b70b1a34f4313d085de80da3aa4e8845af904

    SHA256

    0c3851f8f6d7b9dc63645a68b0db991edc9162620b9d757684a4a20206c458fb

    SHA512

    b6fcd078f43082daf299a49646280ac3a30b91d10dcfaf8e9fb9e8317af417e34d45ae7397af9507d4101b7bcc58169c2f64adcaa253fc08204b98020b20b551