Analysis

  • max time kernel
    135s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2023 13:44

General

  • Target

    e80120.html

  • Size

    315B

  • MD5

    a34ac19f4afae63adc5d2f7bc970c07f

  • SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

  • SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

  • SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e80120.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    05cf0aaa707ec91892a743a0f6ab989f

    SHA1

    78ed02fe0e9c3931c5276eedef1ee4f4fdeffc57

    SHA256

    c1a128886e314ac47ee52d64e27f58401641393944b289969840454f9443358b

    SHA512

    df427422616baf806b401beae93584b67da5b03d7d3e4eb5221339181fab784969fb3e3e3c57ce974975437f89a91312f809bea55e7e0730bad1ec940914f8b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6c726983b617a9eb202550b3d78c4421

    SHA1

    cc9d72e13028a805b06d5b02d245228b4a739b1e

    SHA256

    5e69cd3d7e0c2e2565315c131a17d83c284a8e5a3e947e9c298ea83fe6481c09

    SHA512

    4e54cf36d9397506ffc0ca5952d93715b4ef97703f36050cb9f5cfd1811766437596bce4d3ec94b4061e30f61bbfc78984cd4bf17b566262ae31951f8f98a3a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2fdb350989d003a5c445cb93b077ad6

    SHA1

    8614e29cd9ecf5c0e613e8beda062253c35922e1

    SHA256

    671cd7918b4d8a58c2c88fdf2244bcef277e97499187540bceafaa23bb3d411e

    SHA512

    7dd8fd8a5d9b61cf44e0937166b103146ba174bf406d6cb23872469a9240a2d479a4ac1a5c4f2809bad2536d8e717fffad2e93a4b9ada6d326317a9d8b8baec3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9dca6d551d1d24371648cb38f3322996

    SHA1

    e007042a12b8f1787ff89aae938138279c35d415

    SHA256

    1d8744b2cc76dbd2fb3c1d2b19a994938db6b5fb9cf6039db0b3f973779fc4c2

    SHA512

    3d00743dd891cef8e314cb7ff0b01ec7314281e45c488358faf2cd163ffc3867dacd30512464ef8cf7dd6676fc510ff9d2f4211f068b53e12afc876904e12d8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1d525d37365a8f0e45e397975d991a2f

    SHA1

    e54e1881145cd04a6c23bcb615705c81930f6f3b

    SHA256

    e3a3a7400e18272ed608802d2b5f0b7053b5f53e7206af5ce55aefd8d0773ce3

    SHA512

    f71a163df2efa00f8a3588638b2e0816c529f0046f929bdfd19e3eba2d4e3afc1a231181f46013b265f70c08e0b5dd2c214f9c997b7be0dc64b6e496d9b19828

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    68747c9e7450436b00df35bd86045fc0

    SHA1

    601298ff59ce31602d5e8ca53381acdc9da617b5

    SHA256

    bf20ca80bc1aca6065f4794b9fb7dc565929dc33daf490e5b2de781b39171558

    SHA512

    953701b63e170c612a7f2ea15128b5c1ddc848283bf7562eb0bd934c58292725ac1efc7defdd3da1df3c43ec44707531dc85f8f862624b0e9cda55638d07591e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    115ff98d2e160198bfc4e1752830c8ca

    SHA1

    b4ef9bb6aa726d99d472b987a6e9fce7d3ba764f

    SHA256

    aa300fb204f5c0fb5a0ca1baf2d9bfb3ee9d26fb35f5bc284fc227609073ddd6

    SHA512

    effe63a30f6a4b742da4946042b367f1200df87bd9590b28c64aefb42e55de426d7ffdebb9c8bcbdaaae60467f33fc6e86c71d49d7a00cd7b0876ae28f1e732c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f0363d4de8319013693b3dc3224ea81

    SHA1

    17c05e9f9acf16708f6129af9298930946f33fd1

    SHA256

    1272b791d633011412f7e2003ea07b5deee5d662cf3d74b6a4d766321883fdb2

    SHA512

    03f41a19ad33fe024c6d0a80cc010bca86335342629735eb4a25d94247c6f771ad0798a3a980f9a74427d215cb7719a2966a3c9735534f40429855773abd86a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aa8d44b222f5efd162ad5c0cbcd63189

    SHA1

    233d6e19bbfe4d034913b43b3a36220c5553b911

    SHA256

    aa8f73dd15f7e2c842dcf86937f648080d720d3f101de4ad7150afceab5bc770

    SHA512

    4b1002a90aff9c680d2110f04c39ce37a1b1f12d12c1e760ae50417fda876eb0797dd5416f9a9068ab42ff2a0bf58621191576513b47aabe516c7de9304d8f89

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\64WRFCMO\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabA0F4.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarA1E1.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8FW4Q22V.txt

    Filesize

    601B

    MD5

    8104717e0e6db01419bb3895f79da28c

    SHA1

    6c65ce32b8545ad6a1c4f0649640448d15dbf5ae

    SHA256

    e30628994b624fc6f8b8fe1f2b29a53596d0ca442c64288396682fa4cedea9f7

    SHA512

    9167b80abe6e3a510ef3b462e234bb4d560dfee239cd0628b99afbd496b1fd1d700e6aa73f0c9bdbe5132d3e3328d8bf91958459d525477ea19d17308ec708af