Analysis

  • max time kernel
    0s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 23:08

General

  • Target

    182e910f4405827422a74d5a357eee0e.html

  • Size

    29KB

  • MD5

    182e910f4405827422a74d5a357eee0e

  • SHA1

    51ce53718412da985c644a427a76228958de719e

  • SHA256

    30a36451fac183b932cd740ac140623b90a89a160b012b8112b296a66e828474

  • SHA512

    367506c7c7060960ff0e76e5793b70c15afc1a79e93988772b52a6723f8dd71b2675178189bfb4820c7d833202b6af6a933d349b94bebee15fa0606d0df41450

  • SSDEEP

    384:mqMQVAYkg5Z240NjxStOlW5WoSrzf1alAPGnOFpyk0hhJ5i8pZL5LO1jaTHEinE3:35aPoSrZazs8XLIeareSv

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 19 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\182e910f4405827422a74d5a357eee0e.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da50d0d069aa26a7d0014917c8296ccf

    SHA1

    e747670fc19499de2fdce42f6bfe18c7f3bc6542

    SHA256

    b47378da14ad1e3a3a41522ae87568584e49384d54eaafd85a3bd2871240f912

    SHA512

    63cfbf2dbcc3b886e5da5c17fb1e32b6957fc77fbda6bfccf726ed5fa05c19b03e872da3bb6c8deceaf6fc93f59ed894d3b8ebd9182d581a0ff0d19dcfa5e89f

  • C:\Users\Admin\AppData\Local\Temp\CabC238.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarCA38.tmp

    Filesize

    2KB

    MD5

    a8ea75811fc0942e4fac60984fca87cc

    SHA1

    7a47bf1c9d0b4998b191e056e294c043629afcb3

    SHA256

    b313fbfdd66285a5723499704dec56fdb2a6ac92128ee61409137c11a5568354

    SHA512

    b738a307cd80c7fc4fb07f4b5d0b2d4d7529f2f72638bf4e29c5eaa58bf336ef8017a0a21302cb29661a401336f632c10b225cfbff9fab9810a85d52c8eb839f