Analysis

  • max time kernel
    119s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2023 11:56

General

  • Target

    BSN.html

  • Size

    7KB

  • MD5

    b24be79adda1bd97b70c23023e99285f

  • SHA1

    b55ba88e823eb3a95797c416b2ff80d7be6c1689

  • SHA256

    5f499bc8163c7ec6cbb60ff4405d668700daa8766286e3836210f90a9dc70c38

  • SHA512

    00e4d04123fa0f77f9e863605bce5864ad39deb647c176d887af2527d93bca5b7f87c3cecfb4ea50ef9513a06148b5381da7cecfaa16559e33178205d3a199b5

  • SSDEEP

    48:RJJBmgFWGj6TdGruKvbSQHj+M63vJBnOsNXKjtWP4RC5Q:OwWG+RSvbHjQvr4jEPGC5Q

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\BSN.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2140

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    11b55d8ad3d0fccfcbb94eb104e0fcca

    SHA1

    4870aeb90ed60dd6d25cb237c3dd7b5480a8ee32

    SHA256

    abcd89a7349c345b80a31063726cc682f38f67ab878ac5be690fcf0a88538498

    SHA512

    e21e0cbc6e67202d37b913c68380839434a6c565ac980383c5326330045e2e79317da6be5a0fe1da7fd15bd5bf3a090907b5e75d0440bf1b31b2091000a87a21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    397739f11cce59cd1ed7b965003d96ad

    SHA1

    3462989b7bdc96c27ed6fc627dbfc044b044b686

    SHA256

    baedfdcb52a46cdd01e1eadd550bc6e7dcd9efa0dbbc078190c2105b4c1eb2f6

    SHA512

    680422d1426861f08ed59fc2bd327e4b9c267f2f5999b8e02a6a1dd9bbe0691b2a86cff80f0ad950e801515a3fde7867ebd56b02a7badfd5456825792a954775

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b6848c56a34f03d55503503dcdbba727

    SHA1

    3afe1bd5cf2bae6de223539baf63dcada1c81a0b

    SHA256

    201af6fe173b3290ba67645db5d72c101f2242133f92f310a5ddd76db5ed3448

    SHA512

    ff11239df001e21dd78a5b191e59a69c8033e876e2cde480b13e88de578e3c0f7dc1428faacb1c0f3913db50b41ff530b24b8ed9ae800813e8ebe55cf2d05161

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a12bf11638c3c5b67a802315f74fcbd4

    SHA1

    b377a57246ae55d51eac9276768552fc232888ee

    SHA256

    4028be14af08888d9bf38e3aced352a411f79a52272193fb02ad344d9fd29b9b

    SHA512

    2f6d68bd24dc187650bdbfc88da9fb12d3da0cf228dc06a32487c49e3f81b855e20de1147d636c94716944d271bd60df6fa9a6d6ffd87e093d2a91fd5c861217

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c85e0294db1ba28d40028694df5955ca

    SHA1

    c0fcaa64221d24c67acff8cea73f164c159a2a39

    SHA256

    1cd4e476351127dd9b8a9d199eeb6e6f03cc4cca52a6082c5f3c0c7bbce0e386

    SHA512

    ab84fe1f6be256d2193173b37ec0aa44992d47aac36287370d877afbdd1323a786bcb76323491ad62e904dfd77a5cba53480e9bef2696e663807b236fb556397

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    116cdd6439ac79566f5aaa7c99d2d94a

    SHA1

    4a963261b9dfb1026211654f86ade2d889d788f8

    SHA256

    c50cfe0781e369a149c4308f8d43bed06051e02833d1a7acc5e9f042a03b5f02

    SHA512

    7328bbb62bac4e48dbb1f932283337e4f8bd3cc4c5f2631d3c0565c7131aea73d9abb7e352031a8e6684d3e8852bf447d01a504f1e656b1c4647e6d9d92e9394

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    40668a109ca687ca5b8d690293e0c560

    SHA1

    7d2885a2abb028bc4e20517b7b1323f4e267d588

    SHA256

    364a425caa3495a8961cdbdbf3d51b5d62f45f0a3d7104ed80a67e7191db937f

    SHA512

    9a885e60c87b01725063cbf49ab198bf7168bcc6bfd46e53dbbd7a5b3ec451421f75ff6808cf2d2b27ca1aab66445ef49d40c73153abe0ec5e4886df8973c372

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ce2c048ba103c0a1a96d9975bbd5d163

    SHA1

    74be7fd638895e816708954fa4603325ea3643fb

    SHA256

    f86061e15978bc86ac665269c808e791795084163b14b855355686d09c7547ff

    SHA512

    12f24e7a69bc3f31914fded75f9f63d960798c701ef1cfe559c0b5aee05090fe588992a2674fea4b4e6a0bb2cac9dae703d4eeba0bde6bb80c99a885e8edfd59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    04449eaa6399e53cf3c187dddf0ce1ea

    SHA1

    9c6b8f6944b09cca28f83b002bf40dbed72da039

    SHA256

    15ace81c89fe5ea359eb2ffa73ac758cb66e694be5290e4869168c4b95d971b0

    SHA512

    006ca63baff695dc560795bad642b0bced531d7b52080a557e5d476743a91d9af2f0a58042d0dee6f7d6b17d4dde3c974a54a5f6a132c09ea745298627915986

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XZEULFN0\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab62AD.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar655F.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LJFZ4G1Z.txt

    Filesize

    596B

    MD5

    360ca131b7a744e4c32ba5c9d00a2462

    SHA1

    8c99379039582a1996c9feb5aff7be206634411d

    SHA256

    96aa4fe9d74a38c46392810307d1c76adcb13c50b2acc03a64b4029dd0dc5b29

    SHA512

    c99586739cc907ecd2a2f8c62808be0161a0e3127b554e27897d2951d523d591ef5fb66bb6df3afc20975d6f65c996736d919720d6b1adc6d249cef1beb2a42d