Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2023 14:11

General

  • Target

    anpfixmain.html

  • Size

    315B

  • MD5

    a34ac19f4afae63adc5d2f7bc970c07f

  • SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

  • SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

  • SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\anpfixmain.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1216 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a146b588cf5be98cedbde504fda03f46

    SHA1

    6b971ea081303d56c2df38d27f07eb6d76524ccd

    SHA256

    f8741fde2c84be79bbea55f86e8f530562a1ebb718939eb8dd7720dae6138cf2

    SHA512

    b0e976dceb69978482c8f26131380dfd41bb58dd6b6479f2deeee9d2b127d353583c4b90af1cf8c55a6ca16b4f470a2f94bd8c5b7ee9a214fce5682060e9bc70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c6e00eedccde4e6007a314a60d12d904

    SHA1

    3fa5264d09f5cacf20cfa89759158dee97d75477

    SHA256

    242fa4c5dfd25c16bcc49c7d68e94c7b355b6487d5f389239d449faf63067612

    SHA512

    ec9ff169db6adf773ae086bda09e3f2cdcf40a77c7d4b20d9917da680f82638e98cf065c0964728f509d203ff71f9f3bb619891c826506fe5c2f52a2bf1270b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ad483cc2fae6d623a4867e698ba7cb77

    SHA1

    8681e375b23a2743e8cdfded8c52474fd654c776

    SHA256

    61f1594da7fddb2156b019454f123b9e3009a5aa45374a6f35300c6cbc79b42c

    SHA512

    211aa20290f97e2594c3f83fd85643ec3ed8f2b5032a2103fcf3d8d6e439fc515beee892daa75166625490b90703b752d48d10186f40ff8a4bf5f0e687891f52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b4398ff21dd470d99dc252eb49d3a29f

    SHA1

    c4ad97a74ee8917d995c1af7bdb3c29272059e77

    SHA256

    525a901517cacc757eb1cfdd144f5440fe6b25c72619118609f6413709331f6b

    SHA512

    71bde7e4b03acffe01cb5a68cbde51977bb73511f09fbc6be8896b3ac3fef7fea1f4b3e153fc9875f61b2493823eaba6c8f71cd23d9b6977ff690e5febb06fb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f80e777b54c4b11a78a07f2e0314b65b

    SHA1

    a6478a51715291136430ec51bab6850b5542ce56

    SHA256

    e1341428ede5bad910c692ed223181690d380f14d0e11a1ba3d5506ce1f99822

    SHA512

    7a555a6d09a44885ae709eb02c79d072ad3362051a5ec964a6dde49c27d1216ac3891b2d711deefcebbf8f3c5686f04ea23ea9287d7f9b80782aca7ba428891a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    55b57dfd58e6ed24c04f31917aa1ec3a

    SHA1

    1939e334c8a55aed9b7d009d3c76881604e3496b

    SHA256

    b60a9a1a40c90fc11e638e24e7dbe2b81cab6495c008681bafefa056832af20f

    SHA512

    14c0b018ebd39e4208df7956bf2bfce12d7d7513b75dec57903611aba2ec74ead6399f76c4e3d091f91fc0999a3e3a95cf74fe24afed5eaf3292b6057b9ac49c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7c77f55b4a9009a2470c88ea24d4f599

    SHA1

    d0f3f988b9b3787df7dacc2b5c487c24d5332abf

    SHA256

    64b0b6c220ef0ace9f04f4443f8f29bbe6cfdb5f1a490a3511b4ff56ed15bde0

    SHA512

    9e5255d0256c32d9b415fed4fe035684d78aa4bf9f1a0b34224e62228ded67bd2f49291596038b8ea85704699a249a4ed170a53b752393b845745fd3b3b11b4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c1c6f8de8b6c960e78d74820b591b6da

    SHA1

    47581b25aeedc03212de94baf0e4e3db5c478a60

    SHA256

    54f1a52ca972f73e10cdb7481b99ba4a6a7569f7cc04eb5ca836df744ffe86fb

    SHA512

    c5652c076f734d85b61b16cb352c08eaaab73ac4935c24c2f7b0f1ff7c3eee8eff9bb020e213dc190669c475bc50f3f73cc1de9c0813859b7f72cb0bada777a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    510812ae13b6df5fdb6b1be7453865bb

    SHA1

    4a51053710de6d5dccde76095097109135b81982

    SHA256

    6c91feaae1d7be6d6cafec110bdc77508689a88e5755a38d5aa87fe65b150573

    SHA512

    8a5e04f47fa0cd46fed15538e7ecc1c93018692170e596b77084a17bf42d00df4191d1b046cc8a67b8a829be7b30f604bacd0a47f95ce8a51b2de41dff38af43

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8AJTUMOT\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabCEF6.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarD0BD.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5588ETTV.txt

    Filesize

    601B

    MD5

    8526cba3598b717785f3a988a09aa88c

    SHA1

    69bfa9a988cdc2c02ff9b521c655ce6311f11e2d

    SHA256

    eb2b3178db03a7076181b67c54023b8213ed155bc5752393a719acf1fd3f515e

    SHA512

    dd5254e44487c9e2842213e33cd9660c2d75e3732592470b306dd1a52d1248664ca1e906b268aa62b60b68ba6243540b6ed563c6d3b3fba5add58a18aef26f83