Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-02-2024 23:49

General

  • Target

    95b0d5b3574c5a57fd6017ce5b16b92b.html

  • Size

    57KB

  • MD5

    95b0d5b3574c5a57fd6017ce5b16b92b

  • SHA1

    ea28adff5d50257254d463a759a7635ca8fe32eb

  • SHA256

    e86a1715e4e957a537bb18de15f3d0d036e4ad704c993e05d98cb9e57d88e2a3

  • SHA512

    6f57dac38d103a77b014d57ea151d2adb75d64d5bb442a0bcced492756263b18cd795672ee4875a496005f93e8e602abe6488bfc5dc0cf474e1197b6fe62651f

  • SSDEEP

    1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVroZbwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVroZbwpDK2m

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 63 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\95b0d5b3574c5a57fd6017ce5b16b92b.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\64E544B76338020D780BCC40A2A2B366

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    6e89104dc54cf9f6ef8ec2df9d38dc2b

    SHA1

    ba9fa8653a6c58cb3d8c7bce69d8ea2baf78db61

    SHA256

    4c94a38ada16dde13fe44544154beb16b85545366b221f34470146ff9fb653af

    SHA512

    649d1cb392a06c3791f531d4f9469182497f2bf9b4bb1ae0e83c64d6942c33796d0735517f36c3a7d08c85443e7f791f613ecb8eee18fe89cf19d0f76539bea2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\64E544B76338020D780BCC40A2A2B366

    Filesize

    414B

    MD5

    21ebe45a6576a3b48eec428e7b143c54

    SHA1

    770b0addf56dcd7c6f461eb92be61a9280c907a8

    SHA256

    0763299d4f8ba8753032838a49ff87e1cc4046e21ee550b6d4a88081a3bed09c

    SHA512

    bffa536b9ee1ee122c8643a6bb048293d86a8d3a0817bdd6534f3456e0b39bc26bc37269b9fb7afdc5303c722ba75e0a5cd6035d0c06ff902f3d4eba7d55de51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    a0be0f8d69cb3cc942315ae39e42eae9

    SHA1

    05c62a2d94bab78dc6b27bec0d21d0a4e1cbf5ef

    SHA256

    a6752543413c318db00ebdb49a11725026191f37d5a6a06abf7466a17c4dd6be

    SHA512

    13f3fd3d114699b252b1e5c0a7365e099346dd17e24c690c221f632096095d0ee1e08ed7094463f718690d2f041f8034d3bb17774251a401fb1954ecd784019b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\23GA6H25\www.dailymotion[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BJCNBC62\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\f[1].txt

    Filesize

    36KB

    MD5

    c3c454b8772f6079698f40e7c3ad09ee

    SHA1

    541486378639b0c1d322a69a24c8aa28b5f225eb

    SHA256

    17f3271176fadda372109c1df4dfa270f1e52e02c77c583a0f8aa5722ad51e4a

    SHA512

    bc94566d2e63e4484d39159fe754ec4ff90eb7ad9ed79ef51c78b2561b847695d2e0dde3d9fa55c5939c6ab81387a8926974e9ca4bd2a46bac0bf1b6beb14d7a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\mem5YaGs126MiZpBA-UNirk-Vg[1].woff

    Filesize

    95KB

    MD5

    b4f76501db86eb7c731e0437151d304f

    SHA1

    8d38bab451d52354bd5c90a674f34bbeecbed3d3

    SHA256

    058795c57ae91386a93956ccde3b5460a120fad962c2b08ba79bbd11a9d934a7

    SHA512

    f661eb9acc27f471912b3abfd1cac126f03f061fca805fd36c1d2e40fdf148e96bc19ed34a8b755a18463e91be66f30c9484989b22247c55b6e780d68999cd4b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\mem8YaGs126MiZpBA-U1UQ[1].woff

    Filesize

    93KB

    MD5

    86f83cc557017c273dd44fa39d78a341

    SHA1

    8272d698dcfec3b10b55f3e6fb780173ea350c53

    SHA256

    9efb74ddc9821218bfaf7b5c2c8a3e43767a1653694c69de918b9fa503ee4ce4

    SHA512

    0d2ffa33b73d51861239512abd70038870d5385b910806f3fecfd9470af865dc708bf422d4ec0c97becf9eb760cc759d60cf551cdf0ff5a01e3010d9e9e6fbbc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\427x240[3].jpg

    Filesize

    16KB

    MD5

    7d290c23e33d5a977ba274e2d5936943

    SHA1

    02cccf2ce1d54052d1f8de7c2515a7d17a041f1d

    SHA256

    d487e97dff5e247420d759e54a42b2c388255ab3ad4233ce1a079d057c143be1

    SHA512

    45c6317d5f643e04e484082a68405d5caf97c696429568138ab13587713ce14eeb810dad078c04c9a406e284389e31d04c8a6ea375e06525a9d9b4be503f3dcd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R977VUU4\mem5YaGs126MiZpBA-UN7rg-Vg[1].woff

    Filesize

    95KB

    MD5

    dd482b790e27ef56d5bb00a5d1fcdd6d

    SHA1

    4f6d7bf62181a9d26055547a63c6ba67a5e8d7f5

    SHA256

    923a8e3065efb9e594320e03cc5cc5e343a52e60ab2be5b717b12f000aad36b3

    SHA512

    dd3e0e4884cf8e33bd1b0c9a7802e88e564c4fd8655d898ab1f4aca7a990b22cc46f974052d1f3c33423ff1e5559b01fbcfa9121d8d84f10b74f696b715dfcc1