Analysis

  • max time kernel
    122s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 17:59

General

  • Target

    0a0a064fc745aa2fe84d684afe01b8fc.html

  • Size

    6KB

  • MD5

    0a0a064fc745aa2fe84d684afe01b8fc

  • SHA1

    068a3cd09dbfc071611255b0821bf10e96201fe8

  • SHA256

    e1ea233b3f45f24f33f8bc1b6948236e7dd31652caf154e3dbe5f6602c76a626

  • SHA512

    985abfd0e77bc28a55f555731849a6519fa7e423cf8eac479c5a6eaf164cc0588f7ea7d6138b26b64b0f9a052c57f8537006a8503de56857f20022f418d5d4dc

  • SSDEEP

    96:uzVs+ux7GUTLLY1k9o84d12ef7CSTUQN/6/NcEZ7ru7f:csz71TAYS/34Nb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a0a064fc745aa2fe84d684afe01b8fc.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca2bc091edd8f69af594d79828053636

    SHA1

    3975ba31c270c72eff357c95acb71cb6f7ca6203

    SHA256

    66633b4a19e220600969117676437202e348cda5d8d1cc7a5352237b7c8e76b2

    SHA512

    f3b2ce2a3789d58f1126bde9cdf5750e08fa044465d5e6ea07e8cc68eac8cb8e680860293938a6805d35d18d6ce706f0bba24e89818531a51116896149048f38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e5d5224b60eaac3bd55b43a27852c77a

    SHA1

    ec1f175e305b30c458495a9a775e50175e4a9289

    SHA256

    6e84b5b72d704f4fb0e6c950103e030dbe197cafb3cb933d5c8d303a35258630

    SHA512

    479c2ed03fc79125ba90b93db6fef1d25670cf2b37b507a9dd47716696c35c0a960f277f43729037c98316079a3454307f60b7e357729259e9a862ec6d13b5b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3aa61b917adfbfa6b0fbf9a6b54ea297

    SHA1

    8926e39291e6f7a70375cdf31aad22b3516c3357

    SHA256

    103ffd6c13d00795014b020d9ff8457f5e6c877db82250992df2827d538bfa5e

    SHA512

    ac7ac6a4eb6e14d7a65d764b6d4a2aa4f874f68ec4a2e559da6c81b2e9d2682aa2c876f6e5f0cbd5717e1369eb8e86b1104a41b2a8b30875848178dbb32aa607

  • C:\Users\Admin\AppData\Local\Temp\Cab7DEA.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar940B.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06