Analysis

  • max time kernel
    119s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 14:36

General

  • Target

    0172eddbec327171d19b4115344ea43f.html

  • Size

    6KB

  • MD5

    0172eddbec327171d19b4115344ea43f

  • SHA1

    740623d0422218341cdc57dd6d6e6c3335339c85

  • SHA256

    92a646e759f535f7928b23957b6774cd279795cc0c368f62063645747ac3a7ec

  • SHA512

    f2362195c42821cef339747abe7ba1656b939d30c0ac7869044ee6fdba39efa2fec11214d4c1a0e97bc88c4140239137e21a2470528596b3c291f7b9a0327f52

  • SSDEEP

    96:HKRQuHZl2UUNI65HA/pO1m2moudj7qjYND6KBUEFOYY:M2U6I6lgO1mjoWmjYND6JSOYY

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0172eddbec327171d19b4115344ea43f.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:700
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:700 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21942050fc6d65c7acb31e98e1fca94d

    SHA1

    e38aa9dbf76c0f4003ef4aea9cb5cfc627e92642

    SHA256

    7627edf465fb619b75c444676afd09a62ccbf8f6c9977624bf116ca6781ffbd5

    SHA512

    8b35add256e1fe0e291d3fd167d22cfd12c7abb14cd5b0538c12184bb04eb734dd73bc7cab2f923f971fb66d952fbb6ab88b1fcd8dc582b75aa8950c6dde155e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a6d58c1f8fd63fa5bea42ca6b936e9df

    SHA1

    6477f1257ab08eb2d4578db8ecf48a263a6dc79c

    SHA256

    d653336925f502f1491fe4d24c8e0b995bfb45cff532ddbab3efc0a603f75031

    SHA512

    1f44e2c5ec60d2a9434d06638e891df506f13da1739df89a2725ccff689c715b6bb6c1903e07bd3cbe002ec4d4307bdf563e9c1cb65f1cb4f3fbc760f439fdb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    352bc12ea7489dc511dc09545f74b80b

    SHA1

    fefaff97e64bfeaf1da107555236ea9bb7b73141

    SHA256

    c20a0d661deb97049d66159328e3f813c236016e5222de8fc3317bdd49b51869

    SHA512

    ad98760a96d2ab478a3ea4384d067bc6422450af39fb3e3b417d2ef2fb0537ec4a5040f32bd5c3a91aa2b114d26321ea2a141acf2c587597e85b55fe32842427

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    811e900a0797657ae02193412bd95042

    SHA1

    bcbed70f8a88d7cd1e80b510956725640ed4bd91

    SHA256

    f9c94f04ae12a36f61649ba09aba871c8964dd8e0ac446ba578383cda74455ae

    SHA512

    48833383a816238f0897d0dee262f06a7bc0602951ea4b623bdb3853a131a53a138d36f068e836a2d9563b45112531d7dfd3c3f8331b882c07b411fd92acf219

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    015a3b499c508cd6dd1ed7e22404c0f1

    SHA1

    84f42b6bbd83e28ca2b42c8177f37d4856fff6b3

    SHA256

    de6ee860a52a9e026b81347dd4421f807ffc9a9e4a5729e03582c61c49f53224

    SHA512

    796fada77c15ac72273c77f495c5ad793ed98cc8293439fac1c1ddb723fe638ee5a5f7539119f57d8abe27a6e75ac019e0687a009bbeece60e10838e74a95857

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ec6fb0491ccd8cebfb969d41eaf6715b

    SHA1

    7a9d322aa8b1612207b5fe7f44712b1bc9c77ada

    SHA256

    554bfa49fee0cda1359cc560ec75211a9c224c6c9bc950953d3461cc91e8e50d

    SHA512

    0a2f213e2a2496172c1eddf3190022f7d775e3007c436c50f77252c9e5be710d4e131c5fb3ec5315c7de90898ce65a13ed56dc660104a0711adae202ff3a59e4

  • C:\Users\Admin\AppData\Local\Temp\Cab4849.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4CEE.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06