Analysis

  • max time kernel
    100s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2023 04:16

General

  • Target

    download/webfonts/fa-regular-400.html

  • Size

    315B

  • MD5

    a34ac19f4afae63adc5d2f7bc970c07f

  • SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

  • SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

  • SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\download\webfonts\fa-regular-400.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2200

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a3ac2000c53cb48701f7309f234c12b

    SHA1

    4f511bf2d86103d9a006d404b7f84607d5aa2b75

    SHA256

    c6488f71b121c91aa2df4b71a41016216d7db4384d44b44b88f85c71a0d16d01

    SHA512

    5b350f8196432343e6a8a36493122b7ff95a6e62205bddff8ba8694b4dbe56893d0fc2b25000d86c56e7384efe5ffe7756fedac32d428970f499aea784d5321e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a87e77322161dd0bcccc9c6e6aae3bd6

    SHA1

    3447d91c0c743c8f95b6a1ad56ca62c145552544

    SHA256

    603c26fe570bd7ee8e708fd83ac8ab224385cab18a85617e2d2002a8f3cccf17

    SHA512

    8bb021c4c033d6d79e914ccb5231e299b0f88f75e154195dc78884db745bddce8e5c8f52c8e8f11b46a791cc0827cdd43ad3962897fdfa6b3be82bee4710a060

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3e13db3502eed11c0bb9cdfc7f299191

    SHA1

    e38ca66577cf30140a9829bcb3ee736fbaa85498

    SHA256

    6584edd913de262a258e99c97a3876b57ce7f7092c993cac8191bdb97be7b877

    SHA512

    273d6bd732f48007906469b60eae500a378521e5f52c5ccb483be8bf8d2bef2a6aab12119760844f4d8f168dc7b5cde31d53376f46842625a6be18af5b2c08c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d6443f2ce0cbe58415ea3609a5a8b21e

    SHA1

    d4fc603a9aab5c80beb0c97dda7141cb470cb2a4

    SHA256

    493c7c03b2a47fd2b1cd9e0b3e39bd6350708c9db833bbac6ed8c5de0eede23f

    SHA512

    b485cb2195e64ffd044b5f2dac3b8f241351c2fa5e73baa278c4bda98ce652cf40c2d37288e81a52f7b4c96df567ea779f37d47c2b63f9eb33544bbf187692c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    37bb5501bdc896fe6153db444e1cbd8e

    SHA1

    bb3dbf14179cb212ae4bdd08c98dfa49cde058d7

    SHA256

    384cdcdfcd7b5d8c306b8706d129674ce63858bf54d53d50f910380d11267b1c

    SHA512

    beab4fe9294b349514578c1493acb3ac6aaf928de0500116c30d50e7b55c0968d3da684d2108f3370c4bafd611e5ac6da544e1606230c2e3710dfd1ff0f05a8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    44ec3e747aedfe5c536e1002850a52c1

    SHA1

    88c98160d4c4128399bd51f28e7230201c53e32f

    SHA256

    1d70d1c15544d48bf117aa06ea1c08da31e4971bacf6f55b78e8155fd7a88c87

    SHA512

    6402c523f0274d1f2452111daa43052577702356dcb5eae8b74c6c541923b90a9dfd3f707201c743126d334cbb36931a6b23ef2826c67205c8aaf0de5438e17e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f0d0a8ea82385a3ce3586e269a44889

    SHA1

    24520a2a4e8d209dad371478fb99fd3eb581d888

    SHA256

    2195eaa1b072cab20969b9f94421ab75ac5ba6a0d8666fb0e4f48e42ca8987a7

    SHA512

    5f7bb568d7d7aafce569847f57c58245398b9eeb7fca75fa5ce0a5c029532238b89777473170f78d3af157278c7f6537d227fc4b662420e42b04773a51ab5343

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IXTVO3I9\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab5074.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar5104.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\03KUYQG2.txt

    Filesize

    601B

    MD5

    df07344a609d49d0aa42c9ddfb4f835d

    SHA1

    7b7592b973f8f8d8de1589e3f1578bc89bbb455d

    SHA256

    10f6513eed44690592073405ae1a393d1cdc4d7f5839c52738dc098ea740179a

    SHA512

    009f1c56cd8cac2222931e38f3c6a00e656dd8fdce75f41e976da595d0b1a6a74dc194044b9dbcbf51b2888b51b6ea6334f29131b53ae8112c3769582e203ecd