Analysis

  • max time kernel
    134s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 20:26

General

  • Target

    FileBrowser.html

  • Size

    5KB

  • MD5

    596a975ab795b86d09e74c867940fc3f

  • SHA1

    9de4b7e2f9f8f925329e21b746c893b67c14c76c

  • SHA256

    f0405916651f535e00e4a63c9fd901ea3ce002962ce41fbf9d673d5ba0ad035d

  • SHA512

    1b3853fff1da83999404fa92437566c60d7068520dd259b38a1bb62c1d1eb08ac4be90146c332b313f8ccd70ae161e7a370cd8ee08472495981a5670bc9bed05

  • SSDEEP

    96:sQO/NKbtQXrYK4GvIPbamhWJh9p6ME4xPEQwPLfXGOne4FL:slKQMdluzvMiKL

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\FileBrowser.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:764 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3627a7d267b357b376da05f99864b29c

    SHA1

    8f8bd3df1b361c1c09f8847bcd251fa45275c5f7

    SHA256

    155ad802f732f86a20a83fab7ac935b60210b460fc84f9574c6c0160ace8bd31

    SHA512

    6b2978ad4789cf0aae478e61c6f033b546016195eadd48f9c18f2f6de422b15de3278afdf5ac282f84cf203b7a77ed676530bf113f60e23744eccc590428a640

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e81c2c8458cce2b01d81e9e118f4e6b

    SHA1

    69fea05dd60c6a1f3f033265839ab706414fdb4b

    SHA256

    af3fa823d5f96da2ca8bb40037e975f7deec956d82fcc77e4db028cc3b16143b

    SHA512

    76dc665a1ae1ce3b19ccf54c8754ab8d218e47b90ebff62bcfebf486c1ac3eb93857b9b75a0cbea3e2bb7500605fb62b2ffb06938fede3d540670828dae3c31e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    717f9e38e9e073c5da75e18af386f31e

    SHA1

    9bb503eb2d380985d8301b27f2fe845438236cd7

    SHA256

    ea404427d26b639b16c0e30d43e675149e3059dfe14a855512ab23e814e54f76

    SHA512

    34b4043c9d85fbf63f78aaa1e36efbeaaf5f94fc331629e39d6906dcbb60fdef20fa50c49cd6b8aa1c8d0f810b253a25a97615a1cfdcd81e018ce0159724e1e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca91c44f672ffb489cfc75a476f1461c

    SHA1

    469409baa2a7090ab4adabcd13cd6c2d897bb356

    SHA256

    2f4ef631f4481b104ff9324a53bd2712c969881f087a565cade98f8698c3bfc5

    SHA512

    bcdfa3e972b5bb567851a71bf54e5e59093bb78cb23c0b5e7a938252bd34c8918414fbf26ce941d3e447c084b792d6fd4f5a051eb8450fc756bc66d3b13c3cb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6002431837c6d4b141ba59b0c230ba84

    SHA1

    400aeef575bc997813066db8bde8f379c8b21328

    SHA256

    87999ca82b30f74a59689134b31704c36ca4b8c0d0591c1a9bafe321441dca26

    SHA512

    138b38d74787c0856bced38118b6338afb90ed49227133af487f90c42747d1f0aa6052d2361fb157c11e95878ea0017709f553031231f2ae33bf24de45989e02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2721facef167835448bca7dcb8db1789

    SHA1

    66dd3abe60fc4bffa39fcb4baef2c21472c936a2

    SHA256

    4905a4c3a21b67a8535285a4727de2f0edca2c5bf7aa322524147af9f829e4d5

    SHA512

    07f484a14c60c9f75e4dbed5419f0e2f9b362d2666013616acd2b81724324d43e3e5a7229ea54cac9a6049bf8f00d251459750f736c773f8a5d6522f404a15b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c550ee7a5fc9a49190e53a27bbf01a5a

    SHA1

    d21ae87fa73f96da1a7d8e389728ca35b4c7b131

    SHA256

    a440cfc8539ffd51d87ebe0d9426f46a821c816d5f8f47d60a6f403044dec5fa

    SHA512

    10718ae13ed811f24a382de11dd162d99cc6b528513d545e4589279f21332546de113100a7ff10b24a9d382fd6610dcf43b8d26f9eba419d9990e7c468401cf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    25e8f61180588e8da2c627dc3eb1befe

    SHA1

    b9ffb9465ebbfe8cdc47231bd3323680a751888e

    SHA256

    79c04efa70c714b064b562a355bcf170fc67952696b163aab004aa29db68b105

    SHA512

    38122a876c7594ec16eda2ce8c73c6628235cc4d15343dcccf2e2630f7a3ec15269e1b4f80874d9542500dde1dde838b2a818bbe2a1d71ceba02c36fcccaf399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f01c8731f57a1759c47d9addcab299f

    SHA1

    96ad07f783b677ad85eaf8a804760874c1262998

    SHA256

    dd0a6ac316c20a0a9b1b9a8052e7ee0f7159ab37b2c3cd9a5f58ed1fdeeacbb9

    SHA512

    96d6ffa157ac4dcce2bbf350b1617011800faf07725710be34c307676aa990adb95362eabb59fb260bf1095ce445935ea65203891e9fe83a0abb44390d94983a

  • C:\Users\Admin\AppData\Local\Temp\CabA48C.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarA6D0.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27