Analysis

  • max time kernel
    135s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 20:29

General

  • Target

    blood_pressure_entry_local.html

  • Size

    2KB

  • MD5

    1cdeabe6877fd1045588c42a174a7e01

  • SHA1

    376b5eec8b187c05c562e65dea56622501840f77

  • SHA256

    2f1b3beb96e982fc3a873335c5117682f212f870d5fc4ee6e0e9c2f9e861f2db

  • SHA512

    b3ff351f1ab2a406f8f1b01d6f8ce58052f5edc5307d84c331febe2c972fa3354ecaae2da9f97e278666692ff56a80d020d49c587b184307557b8adfcff234be

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\blood_pressure_entry_local.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    00437e1a95f3baac051a833804cf3137

    SHA1

    1a24a64ff21cd35f29607829918e02a85852c69a

    SHA256

    9151221deff5814bdf2fac3bf9841a15da54c14ebf7e08dfa8e88861cfd2454e

    SHA512

    160751e8afd4bbeac23cb7f4463f12289dd5140b582355486a0aff36b1aab9187cf0951b658cb04591fc407a4de3535935ba5f95a5455f5abdfa5aa4da341a11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    744181a035572f80aca0b3ae0e2ab0aa

    SHA1

    f846f776a625dfffd86c6737deafe626522569c9

    SHA256

    5cb56cc1e9a5bc477d3aeca317fcc7359ce088e83770bca19ba4bf649c5e1fba

    SHA512

    367097cb0e2d556c7ce657819e1f2b2f8d62e926d45f3249682a0af5be6636cf25dbfdb31b3d5b04f9b927bc5fb758e38c9155cc394df194f088e5d2b5e75828

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a560905b15f5dd8fde2fc7565d0ce5a4

    SHA1

    d7b65143a2ee7e6159639432ce25602ea18f3cfe

    SHA256

    5ed37dd4d47ff0dcb10d5d5c7aebb68b180e2cdda2f4562eada9ff143106af08

    SHA512

    884d58434822a25585b31bb83a3baead44bfe6da397dca7f35a02dbc50d749132e1d1224debf5708bd4b256af9e1cacca5405bf52b36dc68aa7bb7a3d8392844

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87757bb042fb5f670c3163b7a6af2830

    SHA1

    be1a88b0496da497bf436fbbedf5d6a50ed94301

    SHA256

    eac063d32f9ad145f35f1c26b21d59574a3e7cadd7d41afb0ff903fbac950062

    SHA512

    655cf202e70c6ae45c6ae109e6018775af706d14cee5eaa08e287c14bde1d426797ec69cad2e1aec2997fcbf6c0c2884476a27449ace653218813dd846e675c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e9da8d616cb7a1b897ce20983f78112

    SHA1

    4f7e2e0e953c18a9841a51793b7796a1eb625adf

    SHA256

    ff6f296b9eb1db2cbb4e715f96574d2baad33baad1601216470c6e2bf56361f3

    SHA512

    9aeb3c13ef87e9c379bb6a7e6a4e46c833c738cf9013dbd5cdc1a8e0d952882c0718b0193ad74b8ac7827ed3c9cde895782a4522d694923c465eb4ed5491c8f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    82d8973cca64ed602142c9feda61d105

    SHA1

    05cae649ee807d837d20bd0ce8fd41e4dc5872c8

    SHA256

    83b1a5d689ffdbdadd1ea8c066df66fd0ea110ddf6a501a1993a6cedeee6d596

    SHA512

    8b769f667479b9999dc964def7c89eda4868a6d50168be36e54de7090a72e5b2c05548c00d7cf1156b9028caf75c4494fa027c255c45fcf1d7cf8a43278a062c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    effd993ca5a48127d161ef943ead1ec2

    SHA1

    18a20b6cdc451567d96d57c812f8cffe4a56069b

    SHA256

    52ef29cf995042e5a7abf304b46a8314241c370ca0d830b81490b66cf36613bb

    SHA512

    6ef8e30f05c364e4be64ff80927474e8bb36abb1aea04ca6ee1a7a9c5d44d69e66a4228c1320c1d80081d97ddcc13b158a16de4099852aafa393d27b7ffaa311

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fd4037592ab22e24830d88497b41c36b

    SHA1

    1357e14f13cf574f43d8b7ef73a53e41717583f4

    SHA256

    ea90c05511c5aa13df17948d57dbee4d013707aa3cbace84b8dfdbd7a1e67185

    SHA512

    fe1d132a1b4e8c70174fc82628e86bfb97fd5469cba57bccee308abac2107aacb5b3598d6b2906aebec9518d476a1f4e7d3b0c4da1cb7722779be46778576a54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9729ff9457a13ab3450ade49f840ed0f

    SHA1

    a2ea75d3e01df33b9b959388df7603d5f3fc4485

    SHA256

    95b750cdb834df766f109fa7b57e79310f592dbac8b305920c60d3d2ac46ad2e

    SHA512

    64f33b8e961b330864be3db92d991902e7fda6139cb45fec7cf07e22347e77035a2fb46b3d282162c5f078c73fcb4ec385bb328d2cbe844fd896f9d2ac76004c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a903808aa04f5cf76509cdb6e385f4f

    SHA1

    ef86c6dc422bc2708b3791c94fc66638136ca99f

    SHA256

    5f5bad803f117b8fc16c258f6beb81416107175d563368321ce34a60274e90ff

    SHA512

    ad10a892b58e6fb69cf24c8bafa48385a7c7f73e8ff03772a107ebad8c0a666d36e713e3c4a51e4255219c456aeeff4ff24b2eef3c17a706d7fb705b71730997

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fcaa95c8f5e50af8de16a19d90bfc66d

    SHA1

    ce4e9791a22b537136da15f1af20809b60b47574

    SHA256

    832936ceae89a7cd255564017b7b4eb22f0e10dbd2673fdd13cca9e55e4a12c8

    SHA512

    a17e5591b585a2d48f09e3a73d70811839d9f0f93bab0a60485cbc6003bad6be8324d77a4d50e8d9a6eaf158c2d69b0dbdf6bc732364759939a672fae639cfb4

  • C:\Users\Admin\AppData\Local\Temp\CabABEC.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarAC7B.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27