Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 22:03

General

  • Target

    sample.html

  • Size

    29KB

  • MD5

    e5573b9d1a973bd52cb79137fd5b7412

  • SHA1

    04dce098cd2461dfa7c75e6ae7282259475a7ead

  • SHA256

    b308742073429d33487e7dd51e81f19fe2ea6216c4dd91aa44ca60be40b31aec

  • SHA512

    3d123b50b7550c0bea040c8e9b450995e50c3d44232bce212867a793c8e6f4bcb0b3e5dc61418e7b6f82ab51eac3fbff931f8e8f3dc8d4b2d94fc9454b9f7563

  • SSDEEP

    384:SIYiFpv17jD7KdT3Xrdx8OdTChLC7CWI/1RF/vMotdvu3hl:Si9F6rdx8OdOE2WsM+dvahl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2716

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b22573950b04f065884dc8610c113686

          SHA1

          9ff856e02228033fd17d7265b3681d4a97fb757b

          SHA256

          ed6a9a200bfacda2f9c2a9000df0ba995cc7bdbfa3ea4a8b3235c54d63fa14cb

          SHA512

          2f9c7638df132bfaf64ff79cd2676bdf0f58f29578d3fea45b3c8693c9e1fbfb878d336d484f15ae6eb01ad7297a6f02f4b798263abc22f6975c4f6ef3484a76

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f11afb1a57b3ff751355d83305bc8511

          SHA1

          ea43311a58230b2f7ae118a177b2ea15e0288932

          SHA256

          6a58d3b208fab85c5d96c5158a48bddfb3dfa2e263aa6c25be6434bbe9380ab0

          SHA512

          f80e0bbc7d5728acfb7119e1c8804b937cb067c0e51c7a77ca92d933b703b0e68803c7b1ecf3d944e8d390219379d0b212b30a6600a846d17b55fcaab38a9829

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          cb86c6728dba8a28a3111cc38a358462

          SHA1

          4e6cd16f67cbd0dc8116157a34cfb90f7c377869

          SHA256

          ba8893125f5aac7307b982a1434055cc3869e3ffdae3053b709efeec355a788e

          SHA512

          7b16a8c81d72e7d387dcbd7800b80a89dbc3be3d2bfd7f59e0af2ba47b9986ee9e391a1785583a04dda38a87e778b7515c6ac1eff9f334bb98ec88ec77c4bd34

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e2e1f62b2596affc2501f4c553e625bf

          SHA1

          937167adae561d2fdb931d75ac6984af97f052bb

          SHA256

          2b8b1d1ebde0617ef243af14a96bd377c5036eefc9d0c4dae4b4ef6f24cc2320

          SHA512

          0ca997c5b981505712f9bfd79cc12ee08e3b1132a499e179a3b297271b166409a10deb9a90fb2d4585b4d9e2dda578daace2c28510dd0435e73fc382a5a10f3f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f058dca6f2c4ce1cc0c6fbab4037fad0

          SHA1

          df8cfb76df4e416e5c4b6137a0fac1d08c2231cc

          SHA256

          915cca8e7075dc8da26399a63390d3fd80b6c21cdc081347c841f9730e474475

          SHA512

          4e6399d816e0bbd6bfdb558f27f53defe828f8336b9543ab9d722d737bb8b9e5c6bc6932129bfac3ed70ac0ff5b1005da69e912f0b56d9a0838ae2aa36d02d8f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b60f38a6906b50fbb464678249a1f977

          SHA1

          5f3e0641e8b44b824e02ae1a38925e82c84bfb5b

          SHA256

          82bdf54d82d74a5bf980ee61f9464d07a3821c479cb743ff94d09dc2d6df28a1

          SHA512

          6afb2cbccee3062356e23b4263d257da8b65a888448d39eae4285198da1c917910cbbed272deaaacd01d8789f7082734b8e67c0b4f2708681155ed0295bb3edd

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U1J1BPYJ\E0JY0Z2G.htm

          Filesize

          114KB

          MD5

          1fc33214a308d78bace104d3bb3873d0

          SHA1

          e458a02f7746553c4fb51ecf077bdfa5052221e3

          SHA256

          8313f95fae1ab43cdf5dd271f400f632692c1159c07feba5a7cd9e48acfb758d

          SHA512

          c55719857433fdb2a75a535b04f11647c6ee5a8b2cf451858e01f7e321b4c8944b6f28e27506432ea2ce74cc2696fc19c53aa442db59d99af2774e0a272b812e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YV6H14B0\Compilation-of-Forced-Orgasms-in-Steel-Bondage[1].htm

          Filesize

          5B

          MD5

          fda44910deb1a460be4ac5d56d61d837

          SHA1

          f6d0c643351580307b2eaa6a7560e76965496bc7

          SHA256

          933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9

          SHA512

          57dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1

        • C:\Users\Admin\AppData\Local\Temp\Cab5295.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar52C7.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06