Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 16:13

General

  • Target

    ec0bca3e2265d995abfe895276f721cc.html

  • Size

    48KB

  • MD5

    ec0bca3e2265d995abfe895276f721cc

  • SHA1

    e2b49c24270e8ee043bdd6bb72736915d6f623c6

  • SHA256

    1366634f6b638198f63e67e3c4407c1fcbd1dd708c9341921144ebb436fa2746

  • SHA512

    f37500a0b21eedc2a26a0d9550fa4ffda350136cd070e02692c7cc78df7db86b2351f35b675ef4ba0f42b5685ae1c19d208a7223c115953eafa13138c0c37f1e

  • SSDEEP

    1536:+IRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZIuv:tIuDicin9geAr

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ec0bca3e2265d995abfe895276f721cc.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1768

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e87d9b3b1c4e0400e7db6bd5d43b137d

          SHA1

          b831d57695611552d3a32c260e2dad112cad06e4

          SHA256

          5f59cb49a0eb0f65fdcc82cb9644468e4b571e665c35b2dfa1365a87efe06fe9

          SHA512

          54d9a87b209c518bc1610fe3f9d4216c4486fd1fe684869cb53916e9f87989cf555e7fe4dd08e6b37e2ec4b40dd7bf5c02b31190d55f1dae62518f5917e65e0d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          bdf46af34aac507d5d6cf8960306c20a

          SHA1

          fa4972ceb44fc04640a382c00d31d427b5cc68e8

          SHA256

          37ef1f65603c7b83dc59d93a3f0dc139d1f3d200a66361bf9b9334e00462b54b

          SHA512

          ed2e42f13067a18588d1de85b2f83dfd840d57834ebd673a7b63a4d6b8a067b95ad7cfdff6cdd3a0e3d7c17d3158245f25fd3b4fa695dc0ef42b1b2b4d21fc23

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8ebfcae55704e21ccf1c3cfa57b42fec

          SHA1

          056021a095273920e2b9543419315dd42b376e89

          SHA256

          ddd41294d9102e8f0a5f7d35399c78acee2dc75806ed60fd6b56d835363e15b4

          SHA512

          28e0255060315973d7c2e6c1d5bab46c5b1cce5b4fe6cda713bd2577cdd89563ed7b417a46cdba01f299a53d9281e6cd7091522cba75d6e93ef4281fc08634af

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          79b696397a0987caea0035e6b09b90d5

          SHA1

          a5d6e14f47f10a70e5229b1e807c0ad811e8adf7

          SHA256

          4c111639f7c5458703d8643c0573361939e05cbd4e5382bc35c38e35e18ac32d

          SHA512

          842b8eb3d9626973fd4ef6c1afec85aeb9bba6041d5e1183d7ba50e949303284de6ceefec77d8085dceb2c6cc45e4d9f83c6e302661b58138be212d3574bf405

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          cde26af81be7a2b0cbe16e3c2dd7d01f

          SHA1

          9a39ac6b49567a1ebde5ceb8b0678a96ab86ec62

          SHA256

          257a87024a994db98f1fb51f59749ce7bb844accb4bbcde2e4889265ec80bf70

          SHA512

          7566fe94690373dcc5aad2dcc03aaf5772b064035d1ea514e285bae17981e32eae562edb67b72e58a99cce4bafa11034ae03e7981b74e53ed29dc127d0073527

        • C:\Users\Admin\AppData\Local\Temp\CabC6F8.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\TarC7C6.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06