Analysis

  • max time kernel
    135s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    31/08/2023, 22:00

General

  • Target

    10.6.html

  • Size

    862B

  • MD5

    d7485794e7f5ccba1dc99efec50eb290

  • SHA1

    59e9b3a2d90fd56f7c059c99aa2fe4b856367886

  • SHA256

    20489afc109f7d74b993534c8dc08c4dd75b92f93c8197d7722e7ea14369acca

  • SHA512

    b589533bfb76cfeed6d51edfffc58540e69213e97aa8f249a6f22caedee92362047b32a79e0fa55b469b388e0a077a6bd2fbbe1d1632d9a647ff460f0a5488a2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10.6.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32d122b29289b1fe3e43967e1b4ca756

    SHA1

    6c605985aeb776769522cdc467b9482304cc744e

    SHA256

    eeb562c7f07c9f2caae865e2157d21c77730f39c7136076f27503c6c3a463783

    SHA512

    c6adfb9665c75b0840cff6f43c0af196e4f432b3f78bb792af1847672d9764c07f04cef7781073fd2c9b905e364801639ef4d131cbbc5568867c14f54660eecb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    06464d3e1dc0cd1ca0f01037b4e9a53c

    SHA1

    8c123ce60a8a135e162e2c189167580ad30377f8

    SHA256

    2ed4c97b5efd80170a565c8390d7e1e689bab0829bacdec4f1735b679d454146

    SHA512

    926b9f226d7659d5ad06846fa9691c4ea847a464a3cb5bcb85d20ac9d273e8327d9baf208e0269a44e70915c02b15d6c709295716a5974e9965a4625b680acc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e21257b60fa8235ca3ff1c47a15f850b

    SHA1

    61c93a06fb1720aedaee65203940c49de3384c3f

    SHA256

    953058b602317e90edd7b0f9ad981195d981fc5a2fec2a933f0408ed97b85837

    SHA512

    4f5efc333f2fa4ca33a629aa67a14e5973f22387ab3098ef16f6eec342ea08165c68832dedf7abe2c7d7c8596a50f73d5661e577e53faaec23cce8258981b3f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e3b20d5ed0b92e602071116ebfd42802

    SHA1

    63f3217b477f99f2f1fc277a03a6e0b8c6f4bcc6

    SHA256

    f82717ac4322c89cc917d6d6c7ba888a60aedc5e67c00d97c0a206cdf2707c0b

    SHA512

    3d5223ff874fc4c139bdcfb36c70823be1fb7f089c8cd939b86f0975b7a3a475195b2aeea244c42fe8ba7971789eb54797d48d56cf1bc0387379dd6c3840cbc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2654ffc5bdf8461c2d72a839353ce5bf

    SHA1

    d2d551f9bce053a333c381a8ecfe66727d9c3691

    SHA256

    adf6242d099a9485dc718b28dca42406f19275100d9b8098fa6e058d21fffdbd

    SHA512

    20a7ec97eac53655c4962bf943d4d980613921e3d99a51969a9e73379732bba4a49bd81efd1645540a5d71fdecc5b91d37a2a48d310fcc6f22f8f11672c5bd9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    121517e2a1b044431dd4ac79d9729a0d

    SHA1

    9775dcf86f1d6696ac6bbd6bd25b29efd8bae269

    SHA256

    98760506835077fabffe6157d28155552d7c98dcd0c0129f0e199966fba66394

    SHA512

    29f840f862199408146c21890a3824ec03d57ff8035fd86867a387bee2308737fed8425139df55ab7b8fded8fae2427c5d106228247dfb1f090e4524d8bbb64a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5fefb259d0217321f87f36ae320d6c2

    SHA1

    82328c6f7320a2e4adec166e115200073c63fd4a

    SHA256

    c24b0a2b18fb5e0c39bbe59c094e41a66329263451ff27e8dbafb9508e4da46b

    SHA512

    3ab59620f8be00bb6085c6575a6d5361d2fbd5e2ab6a925366236794794a6ef0538616fbf3b868c71b0a4d9afa513349eb7aaaea6463bb606261319467b51834

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    38c049f6156027befe6c6a221d8fdc0b

    SHA1

    2a2c34c1900f00c50414930e6c1ae46cb3b05e30

    SHA256

    7bb9daa07e0e21a54fbf13b0309e61d9e08424a3d5e8bd4672edb0bbf4c893fb

    SHA512

    1591f43505cc5d67230f4eccb69fb35b2f88c5058817fd3c026200aa13ab555d67bb4d30c06e198a1add204fdac74ebc856bc624916d5aff7e230a1006d9b05e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94e29be7e49fee0b0b260702a2bc5733

    SHA1

    4cfd99cf8ab9e475e6f5354c67378e55dce5bb97

    SHA256

    f227ac9a2cebf43a401bd2ec325706b6784c6f62df74a92c4810ac93ca0ae9f6

    SHA512

    fb6750460b0ac2e23d4a48c89ccaf60535ecf6ba167449352928c8827605a420170a9d0cf1cc7441dcb604e520d652b0cfe82d6bb9322643d00c9bdddf1d102e

  • C:\Users\Admin\AppData\Local\Temp\CabB030.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarB140.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf