Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 14:24

General

  • Target

    00acd052c7684596af64c913ea50a486.html

  • Size

    44KB

  • MD5

    00acd052c7684596af64c913ea50a486

  • SHA1

    afda36a600e1724142a90aa2d942ddf374667024

  • SHA256

    b5c8a710ec246b31722ef110978869dd371ebb9bf99ae4feb7bad1896d5ea860

  • SHA512

    16b4a0eb5e451027c82bed41648b719e0e47f5349ade92ffbb5883e3f73f834ec420a8a84a2a28853c04acc8ddc8794a0d6d59a8423b876fd0f4b622979c10f6

  • SSDEEP

    768:mwS0l/sGVLsk8ejW4mTNn2obselgqvMg0ny8Ak:mZJtdselgqel

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00acd052c7684596af64c913ea50a486.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b86cb508b08f2b9fa1c75bb125ad153e

    SHA1

    6ba654d33f5dbf307afa36da018c0a2ed82d1e90

    SHA256

    8feb668f95aed49b7ebe835102c248f34eaef89f781a0a5099977c23d14e01cc

    SHA512

    2aa2f3597f3632a759e5d9c9ff6fa5ef83ee4fe2cf007d8093bf911a07101fdf559e607b046fd2017cd64ecba40f9bad6051733093b42dbf41a9eae97ec77b6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    99e24c90e89867e59b0478be0858b42e

    SHA1

    66cc7513e59ecdd38ea1a53964c1afe160d27424

    SHA256

    f42b7258eb6e27dd40c9e4ce90dd05181d7cf2d3ec4b92b0ca6f42864aff4663

    SHA512

    ecbd9dc7a4873b21c6ca9313b04c0fb949fa27b35d99912219220490d24d9c4e74c45e2019feeb329680e5e22fac3e7f3af15757dd3a9106d9540158bffa143b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    734ccff86caff626da017cf51cbeb02c

    SHA1

    308c5cd5a147f055991a85a71dd6277c317658a3

    SHA256

    92d47b5ae9daec9798690159228596a9dad5bdf58459d4a621bc210d3a121a44

    SHA512

    a37a8dd5cdcca76cf3404a7da4e8646ffc8d9a4b0f8c08d8d04a46c4a21f5b794bb1b75f5207c0209ee715300796da77f2147bd105d0391c908c67c9db323900

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c8c641986f0c14e9b31e7eb800ea5785

    SHA1

    483183c23aa35dda34dd5a72d3fd9fa4c3df1d0b

    SHA256

    caad517b7530000abbf3a9939b7f155a9aac8233323f7e351e306a049dd52a26

    SHA512

    cbcd44be6b7b5912b563540abd64156d544c79f777d24c39807fe8ec1142d41f24a669717a26abe7a2cff70e7a4d91371249d06b6011bc06dc0bdb3fc14686ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    775af69e6eba41546c8ef5191545c835

    SHA1

    d9fdda35a949d4dd8190b49a6a1460f1f3e1cb96

    SHA256

    ee5ad284ddf32cfa72270fe1979344c9cc6bff736040e6a72f168ebb0a70ce97

    SHA512

    3198ec542d1b28a9b79db0678a4923f1753d8d630ba1a785c7d603a0eedb6f9d285df535a75bc26589385d2825e35a7fdbb3bab2d731fe53fd3b6cc55af80900

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d71e5f6f4bdbc66163ba6cb05475b2fa

    SHA1

    289dccc5359f0373657081b62de1b5201718bd1a

    SHA256

    8e2fdaf2af50b2648f0c947985a619a3be8a9a84885243c800526e41761bd471

    SHA512

    5b547304492813fed2879c408f374ab2cc06cc380b735d6febbfd6ddf3cd11a7b563536c9ae13e807adb19aa2b6b8728ceac8418513d98fe0532567130cc32e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e309a0483911b32ce0a770839a328709

    SHA1

    45c5f2e7c5e7ecfd30089972799d5f6cbaff204f

    SHA256

    4ba226e4cb9ac14aa44c826aa29f1e2415982eb092cd9e1510bb16be9fa31209

    SHA512

    122b178ae5470681cac6c693c1a2c1f37f6f0b39b3d13cd349aa89673cfb5e4e2133bd88be50e8abe2c7a4d5a121b3ad7468c15906d7f0b7ed1da3287f3b48c4

  • C:\Users\Admin\AppData\Local\Temp\Cab12E7.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1412.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06