Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 21:59

General

  • Target

    143646399d8e29a26716775630955116.html

  • Size

    6KB

  • MD5

    143646399d8e29a26716775630955116

  • SHA1

    ed39aa5f52bbc41006e8eb983ef6a4c3e7b04bb8

  • SHA256

    dcb24c1be70b5fd7fbd53b2ce579377cdbec9048b12c4d754e8165478d23c3d3

  • SHA512

    ac25c83b660f03e739c9a6d8357125f3e383df3f5d7d405776dd6660dc554cb1fe1db1a3cc1924cefe2c9115463c2db32f0405573862989936bf68022701ce29

  • SSDEEP

    96:uzVs+ux74hLLY1k9o84d12ef7CSTUaF/6/NcEZ7ru7f:csz74hAYS/F4Nb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\143646399d8e29a26716775630955116.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6cf127eceaea435e2911269ee287277

    SHA1

    ed8faa291063e87a29bb90685ac701a8c612910f

    SHA256

    badf99460b0d60627cf93e171eaba6c6be1dd477f5051231400db119716aebe3

    SHA512

    7b73a5288f88b7a0e02acb56e41ba37cb6f129e5b467aa3893c157ac90ac7df3dc593ef1213688ce6b1c3cc7cc221777cc302a43142fe8fa6733719058567f31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed4cd8b5f84a341324fca228f520b5d4

    SHA1

    672ea59cb06b551c6d3babfa740fa5bb428d0d2e

    SHA256

    476a72d535c28790184ce266791b29baa7319778fcae85220fdd85fe23bfa1d0

    SHA512

    8b7d35428a03f42136b82066055b10ce4857ad2dc2b610fa2c94f163ab78f12956d8a34751a2c526d105af508881a63c4ce6403a43325567b3f9bb7f792b551a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d54103706b583144b95fd80e1746cfbd

    SHA1

    942bffe371546f73888c836c0ea8e7d257a142db

    SHA256

    8f570b778ed8c1c47606fc4cfbd89b99434d93ca69675100e49d915cafae9a1b

    SHA512

    409416af8b91b7a335a100c0bbf6070fb82188152d3d27f005075213c2e58491bb10c870f254abfa48704b2cea14e02dc96bc1add3febea07c64d6c4d0bc4455