Analysis

  • max time kernel
    134s
  • max time network
    170s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 20:18

General

  • Target

    a3.html

  • Size

    4KB

  • MD5

    e45bc77034b11abffdf667c6c45356f9

  • SHA1

    052b4a0925773fbc835787edaebcc1b513882930

  • SHA256

    d201d1202643f03e74159c0ea0342c74cade90512270bf87511c25c117ed2041

  • SHA512

    389c1188b4900924b52d8d4935da16ea225b535833b41ebb0e9da4230892c7c36a01a17897257ddd4607d08778080dfd0a3e5c7d75729c4b1cf4bc2a4d347cf2

  • SSDEEP

    96:T7vDnytq70sfeUolTMzTYXTMzT2bfDZ/eMxm2/Ixajv:Dytq70CsQXYXQXSN/eMUAv

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    203f2f1ed2503c22cf53967a8e1d896c

    SHA1

    37c45f01252f7d4435af35f1c7e0ae10e051c134

    SHA256

    0ba6fedf2500ea764ed05788e3b09821eea8adf95f200d90676bf2472856c0c2

    SHA512

    6fe527671b844848438e18140659b7145e5dac662be5ae89139d234db1d72f4b2d60f483725cbedf383bf44625d20805fd937e1bed9bdffcd49933aaaac90105

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    129d7a4ba09790a9ea750f10448a0c64

    SHA1

    e0d4d431e226c2a49680d5752c06cf175271bb38

    SHA256

    4da6f25249d2760bcd4dbd216c8385f2a9d600d4e742575067605ea1fa082efd

    SHA512

    867bd5572633ad42f2f083b9ca74ed20e1e80982e1ee1d1fae2c2631916efca4c0e49b4baedb181c16ab4f4e5473391648c9fe998b1e26813626ee1324524a4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b46988381df5a41fdcae5792761232a5

    SHA1

    129c3a35419233e3293faa9e53a0f124c41d6f34

    SHA256

    4e666f3827a12279ced86e18c30708ae850a8ed0d8a7340c002365cfbef27548

    SHA512

    c59a5ff29039111cd98e1a744324d5a3ea99d22488f9d85621679bc48fd9f29eeb90bc3a36cccc60c0b51e3b44c71a540e9118e03c31042c4773fcf8f2f98d93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9fd5aae831d6a565d324c3afa1873e40

    SHA1

    0f4e0d857cbed047eb942df7a0e5d5c69895e2e5

    SHA256

    8fec3adfb66b5a51febfa30d1f4d800c04ffa857522ac973af5bf919de590004

    SHA512

    5644687ad575463a5b18ae3d5ac9666b601ddf15bab33c115d5a4421cb8bd5540a92571573fba76211f5d2c7b4c13781f203fba694023df252e51561a74eb641

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92c3f0d3b2a407c65fa318447cd7f6c2

    SHA1

    44e817371c9339bc9d133161755a65b3aed36b79

    SHA256

    469f30e614a4dae7eecefe515791fa6033ec0119e603f9ed918e256b3caa7307

    SHA512

    59e13097c395e12965433c402f5f29620045a1212703b2fb4c23f935353f1669abaccec4ed6e6fb43d0528f553a649ba42cae8c0d15b17fac4c3f338c45c4f9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    69b8c304e746ff42784de4ef3ec2cee6

    SHA1

    42aa3a4a2f58c3652af7b550d494777563424835

    SHA256

    46c599446a1b49be3df5eb68110bcb060b7e4de2f46f120dbb57f78f49af300f

    SHA512

    54de61d64f0a7a2bf0050ad83abcdc261119e7a1d849ba267c606c80c4517a59407c5350bf1a3923ceb27c1d5be500048ecd64cb2344660d8817c70c26c12684

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d408a5e751825b77216178230dd932ee

    SHA1

    2e8da4845aae49676f4e95c3058140532a77c740

    SHA256

    e0389b0dd5caa02dc57f8fcca63d16a2eabf0a2c470a0bdb656a6f14fc19511d

    SHA512

    69f5506dfd4e3461a0ff201a82e921a53bc6b64ccbebd3660c1952329823842d84b75a6b93151ae524e862b9cc6b416c5f0e4b545ecf9aeccca175dc128b8ad3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a84d3b7b1d1a016755a435f117aa736a

    SHA1

    934def2b984ad0d91c17907772da978d4a4bf41f

    SHA256

    730c02a2938a59c08ae105ba223d8965cd06e1bd538d1f5763aafff224b3d968

    SHA512

    9d6f35a6e068d0203fd6033c9ce4660096e77b068ec3212204d56a8cde427c6513f89e886b944284e03dc181708c4fe10a7b845398ee63adf696288625b4547b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b40dd2e421a54111fef732ad57ce3cf

    SHA1

    91ee218e31bb4606e87eef97d2f4012affe877ac

    SHA256

    ca2a4a0fe4acac0d7d4cb774ffac12fc6b12456094b06a7deb8c80f4740b966f

    SHA512

    5c4685ae38a14064835a062a8ccd1e1bc93c75058e6eda43d78adc2db0fca4201227a69982d90e6c42732492db8fef6f79cd58420ddef0e4c8ae5e3c5f91255a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c72d03ab87d34303851f04c100e300df

    SHA1

    61eb8c8c531010a1e73f3b0de26ad1d31086d5d5

    SHA256

    2b35298a313b0ec5ab45e4497acf8a313889ce331717fb0b20369febb69ff367

    SHA512

    edecc453150ef40181b5756c0950dcd8cfdbd5ca2082706df00891f1e042e322e955a1c7a80d9fdeea7c51221fed5468b0ae6a823a184a4c8c46f695b2d5c07c

  • C:\Users\Admin\AppData\Local\Temp\CabE959.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarEA84.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf