Analysis

  • max time kernel
    135s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    18-07-2023 16:59

General

  • Target

    5_6232986114823555269.html

  • Size

    301B

  • MD5

    119574ada6c8ef3730ec31f43eaeaeff

  • SHA1

    1b0f0bb1fe03c04b22136e0f2482d62baf098a89

  • SHA256

    a9685a34577747a5605639602510d3156e1669482e47bada45dc231c376f4f0c

  • SHA512

    ab03ab3712461db581afcebe9765a4c692b7d5c499e3772835e46ed97a502f2f0e6325620199d06c9696396a333c541818937e90aa74712551baf414b8824a6d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5_6232986114823555269.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2288

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e1f62f9b2c9024a12a99b9422fa2974c

    SHA1

    deb4842bccb33966d8872f93dca8271d50c28719

    SHA256

    561ede554ccdda774afc515a43bb02e505137bc50073860773265d58ad94cff8

    SHA512

    c759447ab79771b224a5b870f2b709a7d19c0d1ff16981d0f7e54a1f805d4c34c2200a659b82654199eb9d6b5682040339c55ceeaacbaacedca8aa296bc73a55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91049ecf3b162a293732fb834e92c96c

    SHA1

    b0e7985874d1567324948a0ca1cb6d9bdb06d565

    SHA256

    8e144aa4731a277d639fe7f7c50c79a6f8a73d81c990a6d0a363977a09cc3b13

    SHA512

    f7084ce10f72af29b89524fe6f8769a56a82a78a3470dc87816ddf582ce21df1a553b8013ccc914867b5d8981e86857c981b4fb8ddf502dbde4fd43fbb6c4c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6ab934d5d75b511191cc975fc41ccfc

    SHA1

    8cd8951906866d4c239f2d1c011a91e999398b65

    SHA256

    bb4b7c58024930d153b694b9e190b0f939c9de1852645bf845b1fb87ffc02754

    SHA512

    c2fb2ac9783553bc1b9eca5d4ede954774f3764bc4f1a863e52c62296e0072ffa243538c9550025c80d0306415bcd341e0b72b8ec9e22ab3b6eba95119340a97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    725daabaf56b2090c7a1321dfb721aad

    SHA1

    cacaf7ae149ba2f226123f8bb1e8188d0dbb34ad

    SHA256

    b2fad925664326ac08d122a2f598ec9aabf8aeba8eb569d71befc11f328e3900

    SHA512

    5a9f3353b88146f7baf5b181b7fa84c3d74e777e6ddd0d01f9b6c2205a19dfaa611628424f82809fd5d69f3b3bcee479eeffc2b270a120570062a3d3fa61590d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2fea650316f4cb4b97420ce8d25acbb8

    SHA1

    f707071323c30ed9e21fafb0dc487bd6876aa835

    SHA256

    cbaa890ae53b3154b263f644727ddf39873acee8700c930bc3c88ea79520e52e

    SHA512

    f5a11057d9522ff2b7848b3f973dcb3ef479b35f5f8c4f7f06e70192ab6af89945033949c6e65d4f1e5f0c2e8c25a454c816ba33209c1b186516d6ff11bc946c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    428f48bc1ff8485a86d04653dc2fb9b4

    SHA1

    b76e78c90d341668d3acd68631eabc38331bfe4f

    SHA256

    8ea6689e6b1f9eaa62833b3c64dd656433122dc1b7146a09e1378ebeb9b9df20

    SHA512

    eb6b94efe5ffacafe899b5577b489b0ee20dff59d0f7e58d65825453d633bf80ee7baa33c54813410ae1557bd05545d8d3bf7ca23fb3934422a8039ad6aba88b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    920b6efa3061a1e1252ef3d284d6a3d8

    SHA1

    b537a6dac9c2ea142e361b3350677322bfd48bcf

    SHA256

    259f780d7e148bca1c16922049b1ab8c65d2395e14419825a8e40fc929f7aca3

    SHA512

    467d5148375c2669a4598882080c57a032e3c9f06e61f9761ef7bb680f6b3d419efe1666a0b0a94c4bec4266e3e36e3e69b36189b3938d962fa339c0e5ea0498

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    66664fe2d2bd03eab5a548dbe12d5d21

    SHA1

    af6027ce0062ed9a1cf631e951821c12d2053c2d

    SHA256

    c5afeba64e82e45e657edd96696fa2663107cba57bb03ebaa20885dbb2f563a2

    SHA512

    351674ded08a9ae770a18770892ccd4ee2cac09dede7742895a58d3d7cc18b285602e499840fdc96ec5a50b92114b0a8f6376ff36f0f241dd7c61720532c7af7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    106cabc9e272c8262e965d2cf5e68d10

    SHA1

    35dae3548ec5cb26dde16069fc2075abff546e54

    SHA256

    5718825c95e5ced6155b340fa486ce7fad71caddfa91a830e9f87a3fba28442d

    SHA512

    1dbd0c83948b5930ce0a2eaf48c2ee69ad511cec3908647b8239f2e3b8572a8866171841d6223a0d7a14ba79ae60f2743aea5bbfc026c9846564fd7a0808da21

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WEWWZC8O\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab849E.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar86D2.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VDBBB8U1.txt

    Filesize

    606B

    MD5

    f57f48ac5d8ccfab84b21d64bac3ed6a

    SHA1

    6681c7960b7b61a26bc439a76091ebfdefc25695

    SHA256

    e2abd58214940fb17a9705ca99005b8ae1bb00955f99c6fb7213a7bba80f3d19

    SHA512

    5fe4765c857d09f51d0aa8a2e9195798f34d0283cdf3bf1643ff50e5e2b3e3e2b9903ba20909bd87c2d9778c7266afc8e08e1f7dfe4c0bfece1eb69d6d7724fb