Analysis

  • max time kernel
    139s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 17:11

General

  • Target

    fc156c2ca869ef3242cb362aa8779849.html

  • Size

    1KB

  • MD5

    fc156c2ca869ef3242cb362aa8779849

  • SHA1

    a61eafcec9a29a4eb4e607dee8a8453485e5c470

  • SHA256

    05afd5654be3fad5b6ee0043eea1b9050e2e1ee27d17ad725067c2f6669dac88

  • SHA512

    dc7a2c1fe21beef0128557f04736dfd2c58de7d65ab1c5aab89ffa55497788c63e5dc981ad8bd6e62b0d6c9eb479c440f6a67b496d04a415df366db3f9855adb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc156c2ca869ef3242cb362aa8779849.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    e495e1b753eb8181144f2412753d9e64

    SHA1

    1e65fdfe1eecbc536d4d56210d7906ea06e339e0

    SHA256

    7af54b1ef9ba8659ed241da297e34c439401eb0ce6d300059051102801ef23af

    SHA512

    9245ab09e9b844c930c2aa86ad94c1c279f67f4741f750c4b26edde52032d65e7a4b3ea0f1a00fcc875c1ec7c86d79369237cd8dcc4ff13f18c73098b9c89624

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    11eb6513b09fcd33fe83658dd1d2239f

    SHA1

    aacfb355096b943978d8ee8000ac59291e853e94

    SHA256

    bfbf417d053ef01243f00fe8c1e024a780027a75ceb1db61a62c5503ab3ce24e

    SHA512

    e98f8ad1c0f183521d5473cef09f43f67739851d94fda5d2d63c44c86a52ae7d1f60f773c2534b21ff57203c73952070bb128edcbcd6ceae70458e15a992f3f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9dd300b854f738e22fe6954aaedee2f8

    SHA1

    b7aeb0dccff318573a98419b9360ee840bd8105e

    SHA256

    3672b7e01cd9d7d71927af458c3e3b8e1c7d5393a8155996c5dbdbb7d69a7143

    SHA512

    3686847e63d498e8625e42cf47f5fadf29fa832acc817aad4080c72b653bd150551529f7d933bb06a9f8f244911eb51c0e3a7c68b65581c04b7823b84fe66ad5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0335b35bdbbfbcdbd4a2b559dee977ac

    SHA1

    169792a3e61d88b97e2f21f84fd56237c8d54d56

    SHA256

    a2368c086813e3d5d04a4d798af303b0a2fd5f8433e66eecf599310d83ba30ac

    SHA512

    99d6a8375382e847a4da736244242c59de370074b9f06824134e3f6ac2f0edac17a88ecaf81bb63a297f06fc8f157d54821380654df79e72eab573ef71dc7d9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    73762ca65c8755255e0aa98bfd90eaf9

    SHA1

    cd832d117b5cfcfb4b2ba3ba892a9f980175b3a6

    SHA256

    ede7795f87073c329c1c2e85bb2c5145b797f1ebba525896e8e4b4b2c7e5076e

    SHA512

    876c85dfdfff4da4adaa4d49392f6a568b066910cf65d561b9395d880eee7733906570571233e5ce620f435260e902e10a07fc43da638f33c0b5ace9cb59fd4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    88fc65c479abfdcee9894031f79bbc35

    SHA1

    3af60120851016036be339038c91152383d9f4a4

    SHA256

    71bb8746ac38502b02520e01c4e00453da7c8c43ff9e905d80eb4c399d8fd0cc

    SHA512

    1bb2adb28c9e218697ac48fa7a588d00fba8bbb6c4a9312e849528b2010864952b8003e707d720a78886ae6ea671ee5a0468fc465973c70dec846dccddcbbc9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    325f64f25c6c11bfb75e455e6fe04dfc

    SHA1

    386a3426824b442db02357fd874478719718d92e

    SHA256

    0cf0d747b985a48555d93276c04a02a18167bc49da925fb5add7befa95fe4dd5

    SHA512

    6f1def6419e00e83eda8d8295c6423e019ce3c4bfc7fadff7c80c5aa56f5020cbfa2b1fa1135edb3c7495f1f986e63a1fdc47a45b7bdadd13ec831eb414ef23f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Temp\TarE0A.tmp

    Filesize

    92KB

    MD5

    71e4ce8b3a1b89f335a6936bbdafce4c

    SHA1

    6e0d450eb5f316a9924b3e58445b26bfb727001e

    SHA256

    a5edfae1527d0c8d9fe5e7a2c5c21b671e61f9981f3bcf9e8cc9f9bb9f3b44c5

    SHA512

    b80af88699330e1ff01e409daabdedeef350fe7d192724dfa8622afa71e132076144175f6e097f8136f1bba44c7cb30cfdd0414dbe4e0a4712b3bad7b70aeff7