Analysis

  • max time kernel
    102s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2023 11:29

General

  • Target

    index.html

  • Size

    75KB

  • MD5

    ffb5672bf52220bd1181b0af4f44e806

  • SHA1

    15746af5c085bbaf042d505977284e4fc147af20

  • SHA256

    4ac6220df67ebdace82c79df26c9f322d80296f8258911a282cbe5d13c47f3ea

  • SHA512

    1067b23c8a1747a430e9fd279ba27180133081db36ad418e6fbef2895dc9fb48bd8ab7d52e90cd3cc6e159447ef287585f878840b21d638e17e242737d8f0c37

  • SSDEEP

    1536:O/saiReJX6Pr8dYXS4S+XrbSf7WyIsq1f6k/zGn25ZdZ4gNoeoUn11jUG02OkDFD:Bra25ZdZ4gNvXn11jUG02OkDFOk+3TXC

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    807d4e2bc98aa5814f775292a3f50d66

    SHA1

    8ebb8b7ae76b3f17d0fe7dbd04cb629e8149fe8d

    SHA256

    79bb8b140b941c2fdbfd8620bbb088065ef9eae86ee7735e4d91138822446e68

    SHA512

    18d7d701c593f4df732dcca847bc215da16b083bf199986c8103847c460f625163fd8e1ff4b5df0454952772d9d88c95ad0841ea6b99d4710205e4119b019ec2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b24e3b88b39f7cec32ba2bef9e99e9bf

    SHA1

    f83ef51ec165a3e385a6a175462378d36512d2cc

    SHA256

    4ab093f858c3b01942e85258d31d19052cbeef4ab3c2e5ce7ce97067269a19cb

    SHA512

    26f0afd1c355aaf2d4387203c8b56555295de84700915953098d9fe1182b749d788ef81eb2491272206b5686a66f9519dbaab7b695451fa5ce19e78f0859af20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9512ff64611527044dd98f9d72d4ce1e

    SHA1

    aaed066ecf4b282eb9f74cd677a819d644e1e0a7

    SHA256

    6d0578220a1fa02aad51072c8bed9832cb95f5be6335873b8a75695f47155539

    SHA512

    39897f81e32654f32dbcb7231c6743a363be368f161c7b8214c11f99e9b6a26e30aaabce3e65ad2cbf22ac8de3f3ebd733e4772e70eb0e736b3ff6af4c9a20f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    25a758d7766fbd87482167a4a0465ebb

    SHA1

    b4fbfe3ece03af2a4c09899e45eb7f247a4e45ca

    SHA256

    ca379d636d334c24a51b0ac72bc3a88a496847768022222a7b2b715eaf6837d1

    SHA512

    7bb5b20ba3d0ff25de3725e857841657066c0f74252a19a74f769ba1a2494e17411a209210f00d76afedae9c26b519c87de5702cd4fee4fd5662e26b43f05aff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cc96bce5a70ad47190de8d58034a1d34

    SHA1

    bee75af4eeb85fcbc70dde31d47ccf0020635eee

    SHA256

    bc27db2ed0654683a47c14f0c1782c865bf4bb0a993a0e343449dfffb628f4fd

    SHA512

    269730d4b8508fdac75c8144c3609733657422443e97d01fe99071ba8270d7e3b5f66741155419b229bf945209f4fcad174ae61da687f1444d448656900aa98a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1ec8109638f7bc550b43889663d257e2

    SHA1

    00bf1019ee6b868ca59862d4cc7642ed1335b9e6

    SHA256

    b87de558fbfa526e9df9b92fe6ab4c0a0530e9ce43afd9f5d3445a0aaa6d3e68

    SHA512

    acd7fdd2797b428c65923fd80c79e5e090a4547e52892be4c1e3974a552bf276955775eda24625133c9591ae79fe104ffbad559893cddfe1d079a3f885dc657c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f5be00f0ab696bc0a56945cb2226a90

    SHA1

    2a2c7a49c93a1ddd234a35b344858f2bde21cf71

    SHA256

    e91bce7eb0f33879156f30f69ae0bd238c52898a63f4f84c42644cb084dbcdc0

    SHA512

    a132685085e4210308510ca72efac128151952378cc02450f578a44f12fb89e16353565298c0960d04c5df2e4f67794dbf7a72e1b79234789c639aebcf5ea10b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab8BCE.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar8EB3.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\D7RCJYRF.txt

    Filesize

    608B

    MD5

    7646b05e28f58129a3dc0c8c574a3425

    SHA1

    a76c0ac972602de965a41a1bd2e5e7a742d131c4

    SHA256

    2817f735f907dd53d16b4f689856db6d492664fd464481e3e811d20d03d50864

    SHA512

    f1cef3b25a40588fc65178fa75826d14f845e4f5e7d8646c95322f92bf14aa90339fe20cac2c6c27e0f0b6dd5c540eac144898220eb10d4aec7ea13e3bca38ce