Analysis

  • max time kernel
    149s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2023, 05:33

General

  • Target

    Docs/THA/specs.htm

  • Size

    136KB

  • MD5

    9efddab219f72d9d8cd5b7b845e8dc3d

  • SHA1

    9476dff9eb0e13607f880c4fbf62c9d317cd31cc

  • SHA256

    43fb3fd5cd339d060082f6231aa5e9212e27e6f787cba0e76b8877e17e1afd84

  • SHA512

    db7f7306714ecac518b84e8185c6e86e22653ca6fb1cc90e9f3585039d80d9a665140e7b490df02f7e2a0005c020f6f2bdd2d833dac7c2fb2365fab7e23cc28a

  • SSDEEP

    1536:f+AEc4zH+ZJ4a+AcB4z+v64Q+BA64v++Cw64kVz+a646O5KA64wuPA64KTL2n64E:ar

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Docs\THA\specs.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1684

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    985f888fd5d5e99ad2c03b76f8186c65

    SHA1

    efbafce95da9a618815f6a53ce8ca3c28a802894

    SHA256

    dd8d67d13402bef8cf464ef30ca35576c2b6ce99b0fcf2439edcf3e3135524e4

    SHA512

    734342d7d8f33e4cb3e0c16a20bb798239ac8b229f1b93cfc2333827948c971eeb2ea27813976a50c1823d1e6a1b1e20bed8956f50b62ab7f8fd92ef2cac6389

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19f0fe514b91d88bd492a8430385b9ca

    SHA1

    444fc8e6dd41f9aa37777312c4f2d250d031c689

    SHA256

    0ba29893680a841d8de38b46382ccaf75d86ce5b26face0832d33967759e6aa2

    SHA512

    87aaaa1899272314571cf464366c5e7bf7b693d6301467b86544b73976f4ff678f9dda76a6993d5b57fdb221ab6582bb548e94eb8f32bed1d2a3d0bf3cb27a3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    acfc5800af6e7171050db486099f08b8

    SHA1

    92d42cdbd7648f5fb46c62dfd4651119e26c6b4d

    SHA256

    a953ea9dc9a099ef1791cd4d4d88ca692280bd0a422da70364017c067d8b20c4

    SHA512

    e09c3263a6a609014fb511333ff32750e2e9fe163b9d5d2ed424ce1cc032fe1c8145786e223d19134e8c92941c5e1109d98acb55e2fe277f9b8ae0722aaeab34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4661ed802d0be4909f95b9ada91fd684

    SHA1

    daf71ec2576879a116d4f972f76f6881a9a2ccb2

    SHA256

    9a71ecc35dfae9dffb83250db802c2a8889ec5ba76ed474abc2c80b0780f1f1f

    SHA512

    f0602f9919f40baebd8dd486dc20d1d4869193da18d9564a8e67694897e66fbe303dd2a1e72443bea5fabfd5627b0dbed31a7c81b9f2fd662ea2200b4acdf451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    99e901c4fedf801a6c8b93c983bf5b51

    SHA1

    3823f110b3c2662171a9238d46b860fab1d7ddb1

    SHA256

    8b7611279c9e5f507dccc9660f0ab839d65e1e1d085f6eba526624649891eed3

    SHA512

    5ca6c6e97c6053b778f31d25852804e392c5bf07bfced0fe27fc3798108b670785350dc002dffa240b272eeb32664c29a8302791fb79f953b1fbc41b1b7081e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae6aa46bd1351a3b0c962a41f9e72353

    SHA1

    113c18760ca0fd0ca618062983d4682c23c80a2b

    SHA256

    48af751a979e563b13257a8606f0ed9fa11b97ef22398da901f0b9eec5275f7c

    SHA512

    7778a1949911532b5b2cba073f54a8969d90d40689fa615ac44b6a26930fa4fa910731309cab9fc247194e52e4decbdc70953df817a860dd6fd0fac4e8e509bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b6e82d5006c2c4f8249dfeecf6615ff

    SHA1

    3f3f35e3ea1ac19e96a9ab6b28c2dbc30a187ba2

    SHA256

    8d52fc78f7501b86c1a2dc797cc02def1dd14ff5cc6331af07df4729ffecf3ad

    SHA512

    231344bbd17ddf8ee0d53756e27db6a89605d5ea4dc6be9c14afae823317efdcaa0ad2693ac0c26709aa3b9bbf7031e5a497afba693036b10dc3be62b1409332

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba7ca785b5fe9da7c5b53b101b71f141

    SHA1

    29eebf8018ef07bdd58216b8bcf46e75ace7e6f6

    SHA256

    3c8caf1be5657ed2ff3d468046a482df3bfff0927fcb1874d87ac3a33a93b3e0

    SHA512

    1a5d1309ddda8e0c49ff620c9d26835fd2d7ba34287de0a79cbf75bc2058227c3fb5564d4c850c1ba75115b489329e95577b9c38a43d13af3ae41fe0a07062d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc83c73929da6542faa7a765f1be3db1

    SHA1

    2a1f93fec25ea7f2e06b19b2d220f6a4f40b21ef

    SHA256

    b2a2e97151fc05b441c848fa7a311f5486826fc92e2fc03d485e7381899837b9

    SHA512

    2ffc09973868414d00c6ffc6f6ce00fd225ae0e527688223d5aa7bb2040b915a1b00212f3eaf5900739c05e20597b676f8659bf2167e477a9d53e97e1c29bd8e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S593MPCP\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab56C9.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar576A.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XNCOFYQS.txt

    Filesize

    603B

    MD5

    ca72db6ac2857c5139132ce0126b000e

    SHA1

    847ef1157d629a429802c2d5bf38dced72954edf

    SHA256

    25be6824e7ca1e32cc65c6d348ea477154a8189b8fcdfff9c6f09318a7c4e64e

    SHA512

    795b7cf741cd565f69a4c712779755af28ababb9e2fd06b2684a070d420fcf8718b824320c0a61c2ea7f57cb392dc6df50a094cee847f37162fd8e78432946b1