Analysis

  • max time kernel
    100s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2023 14:01

General

  • Target

    .html

  • Size

    194B

  • MD5

    cbb55bcc4e4c013040b33e22faaa013d

  • SHA1

    7995e35b37532ee7abe715f23225a88a81beb5d2

  • SHA256

    afca372f9959cb6c46bde573d25172c1b223dac52cba20ffad3c8fc2ea09cc8e

  • SHA512

    751a6fa05158382c18079bfeb1bd155651c5c0b003ac4a097541fdcc08a1eb3b17e06073a8ec68e9b2f42fe58de5f8b10ce0e10429fb45535a02352c8a5ffa49

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1308 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a9c2edbf6ed3b9af2349356056c376f

    SHA1

    9038894cb8660e749fbdd3a284c4d6a4c0ea5db7

    SHA256

    c2661dc39246f08493601b507827bee9067d9bcbdebafea38f7f51546aee7554

    SHA512

    32f42a1f9b77a71fe35476bc656feff62abdf2ec3cca006f33527b291f1f6f6ea4d5ad4b5cb9b94cabbeb5340d76d8f09a1c3690d6c723148497dce3463b2120

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f612aad9aa570825cb8096bea80c6104

    SHA1

    7d3acfeb2326a51881144d4e766e117f2ee65d79

    SHA256

    b2086ba1db2490e99cc6dbb300e63e40aefce02f5fa5de8bce92a0ce1fe63dc0

    SHA512

    ef7518cff4de46791d87405d52892aa4a44c25b4d49d43720f90404fa6da78112ca32796a74b09b80b7c36274c6f07b3554efc698a09a90bd847e779cc113f53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c2e3f9db8161e13b6db4cac8c609059

    SHA1

    14f1520f7b8cef9b13ffb6e5cecd99cb30267070

    SHA256

    d9b6a371c6457a85fc59d8b6ed2054196b0e2bd83e5311ad9b3752f028068d91

    SHA512

    dddf391c8973d1f9080886d9cdda6be4d58cf5f4a31afc99f7276ae8f6c8d4f1b62194692e18e16dea6eebfb1f9418570edfdcb3161aa10554c2bbc1294d2fd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b275ffb31eb042aeafafef4a11f33a1

    SHA1

    5b13f63ad2d90eacbd1d558c87cc7bc5821c011d

    SHA256

    0cadafaa124cf9081a021429f1c81090f6fc88d4b3cd2f28b391b45e80d6c500

    SHA512

    9cfe0b7a1ec3bca3823e883dcc1055450bdebff2f5be2daefed99fd92e7d3df9f65344a2e4f9c5f403c3b5b78a9fe3cf275240cfec52d8710f42d6e8b87d5334

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    512b53ee1a97454b15c435f986c77326

    SHA1

    34d86dca88e8a6e88ad8db1cbc499d34fb2e6d7a

    SHA256

    b99f675979ea62eb571ec62c4b5d6f8cb4d6860f9ae5e28db1b1f12b2b795d93

    SHA512

    cfc1e775de67b552fac95c424b242697b7a558515237ba1679f0d3c756cfa36f5534adabae3dd89beb6bf101fd07f43011fda634beda6e1357469a720c0a9133

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57dd697c32fef2f02879f8c2a8b9e793

    SHA1

    5f35824b0c1d2151622931602cb77a99e1e837f2

    SHA256

    a766fed8aa3cb51b5cb64bbe5e2fd75fec473cbbdb96584f24fe8826530d4bfa

    SHA512

    49d3970ec29238e2b4a6d61c9d68f4bed01cf9866ca51b219c2caa6c8bd501c5650c0d7e63967a2614bf08434691a4e9c85a0c6dbadc9eed8a8d2a1dd4b7b194

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc66f4556e9ec1187dd4a5a6083c9a11

    SHA1

    6dba8f6eb7fe43df1e7acfe02654396b725eff3e

    SHA256

    1add7d8275bbbb796de11390b41dde791dfac9465a4ee72da6d38688edb9cc1d

    SHA512

    f80f2426edf4e8d025e00919d24b00427b8507e5f006b66ef87fe79823e193082c8674d142e87656aeff0347c6960b0083588a627f8310cd527952961dcb5a0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56b8ad0a2a851fd1f3226cd5ed79cad8

    SHA1

    54d657824d0ff926ed01c388fbbc2fd20a562535

    SHA256

    eb0f13f0197fdade157381f4a02219b495724ea336fabe77b8e044a516a69d1e

    SHA512

    41c2352dea66e863de7250c2dcf48b415d3ff4c5074521e5fe6a71d233dc5de639d74e69b9330b9e538ed3f4867974f7d6b539fcba8061a06080b1af862b0968

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S7FIT0B8\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab4389.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar449A.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ULABFRF4.txt

    Filesize

    601B

    MD5

    3292272d72237a9429f01f4edfe9527f

    SHA1

    98bd5cbc859108fad1d10cfc0d4961a952c49cd8

    SHA256

    85049ad17ace97e7c35499f427853a8f5a907d19d64581a903321a2e01553566

    SHA512

    012c72bfb68b205c9b063ca888f00ad23af3d6ffb82fd305de09cb08dff61a9753be26f05bf1df06af9a5823bdf28db0513ee2b62b36f504ef4c8ff9e25be8f1