Resubmissions

15/05/2023, 13:53

230515-q6ykraea91 7

15/05/2023, 13:52

230515-q6g8rsff87 1

15/05/2023, 13:49

230515-q42vdsea81 6

Analysis

  • max time kernel
    18s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2023, 13:52

General

  • Target

    sample.html

  • Size

    16KB

  • MD5

    8a63e04df2cd6bd9792a9524586b3e4e

  • SHA1

    784ada903b3adde8816dd77d0740f6457ac0f7b8

  • SHA256

    07f978162b8ce41b67036584aab26e303d72dfc9c9491985e1fa67faa6475920

  • SHA512

    9b5a7f0ff5764ecb8952fb579f92aceca54cf610a9348e5622aa95cdcf2ba5b8623b07fcbf884c9db46068f17a0316531142b1254de6b17841c4dc37c44d1ba9

  • SSDEEP

    384:rEFL7aCDpmRgVoOsKuElKeGMzU8HhhbMRx7328B2WBJCBXQL:rYXaCfVoOsKRI1MLBhbQBHDJQQL

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    de4da022f4e1c82f419f42f71617b3c0

    SHA1

    a6e52a2eed1ac28e83fd7dba5d7044dc58a63af5

    SHA256

    7d0928abcba3db68d362898bcae99d4f443676be9f478143c80504c90f1daa76

    SHA512

    39b9b44b70ad8a22bcfdb437532d1ff398bd9fb4d5b40250473e932fa0fee08fd1a4e9b8b077d5e44cf6c0ca640269b634f5a14acf5696a3f411881fb25b8cbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    803b31389e74c316aae00d39ae9131f0

    SHA1

    db08737e262b3b396b636b1df959fc545fd0131d

    SHA256

    f4dc6fca0dae303669ac12acecf8edd21999ee4e78efc904dd2af41d9474e0c2

    SHA512

    23d287fe80e202b6e75c001fdd93f3519b65f3803916a7915f4f79f272e4f55a8cc4da0b4284ac1afd9ac2f24b074e3676a85e36e082bf665a1130ec5822cd6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    12123e1409a08d251f266d445fc81be0

    SHA1

    915dc4cc1a302cd71de152fccd3b5930806ef8e9

    SHA256

    783de5a377293779595385f4807273b951b727889d0980c37f54b6e8e79d48f8

    SHA512

    999ef2756a2fc8eb1da38c6ae9f2952694c45cdd933cbfad5def5b0e32cd29468e21c5e13030107bf9da9161a869533f8b99a8436f7bad58722cfeb348d41cb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    222c49a829054296b56e48bc5459478a

    SHA1

    bdbc7a940966d734a4ad660b395993cb0d78ea79

    SHA256

    3c663a6d31e9867075be97cb70940a4ecfcdee1ad4f320b9d6911853d3908b33

    SHA512

    caf09aad22fc5d898f561341caf43db8c5564e35cc7aca59f7c63572bdfd3b9dcbfb0ceadc2aa6a84ac8dab8b1a713e4d957ac62311e9b752d4281deea414897

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ce4369f079b635d6f683eabcc90eda3e

    SHA1

    d3893ddcbfb3fa90d5e6fc0f226ec822d17dec49

    SHA256

    408f2b170077c13b31df9477eb6fe7260645e9214943c0f58bbac0bd420b4700

    SHA512

    180f5cf14787297d11f1f3168ae6da7fff830df1ba26a6c9c82db671c74e39f873632cd7288c14702ab3f93ecafb26bd8adcf7ff82c216f4226bfdc3871c7165

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2e1bcd1569a92b30bce662a25e240af0

    SHA1

    6e6ab3e926e21cc7d9145374f212904e8bc32ad3

    SHA256

    bba7591390dbfa2cbdc0d7a10a178c05c59f450daa006893103425f4fa261cc6

    SHA512

    9770af1247ae2427a51e23e31fc491e7be10ba4b5f75fa061e0dca23fc731f24ec5a393e8751df3ec1a45ebb9a2cafa720690bcda260cdd60ab05f6c6c107272

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8f39d4f4c41b13b98908f0c032ec5b14

    SHA1

    78ded60457d689e33c2bbefa6d0d66dc8031cfc4

    SHA256

    d683bece671fe78fdbc50516e44f337504d1cda188f55371ecf8d05b9768dbbd

    SHA512

    ebf09e0693ff4d045494818daace63675c4c2696a4879321e1e78770e2afa20f45e16425a351a4ddeddd5f390e5c89e0da0df9b9c6b1a2c807fb9fa44590a23b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2e9ddfaccc6aab6569cc2743dcd2a9e3

    SHA1

    44b76a1fd5e68fc314f9c73cab96b0d8a2947903

    SHA256

    e3bcf353eeeeb3367563779638ee11975ba1a30e4d75f93d04c4cfeda42da0b8

    SHA512

    517f90d6aa02c5ce1b77e8782d91cded60c01dd65158701235405be9e0245c506e95f91bc8aee202c1dd53c4be6bcb5ae4c7d1fce3b0fb0ad297071ce8ae50d0

  • C:\Users\Admin\AppData\Local\Temp\Cab3F82.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar415F.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27