Analysis

  • max time kernel
    148s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 20:54

General

  • Target

    121d4630eca05f90721b70570d1adb14.html

  • Size

    1022B

  • MD5

    121d4630eca05f90721b70570d1adb14

  • SHA1

    9f8275153c8e8ad9580f3f27ec2e80c144291897

  • SHA256

    e215adcbae98fc0c297c34e0ddddd7ce625f6e1e97a8f8b170021a38078e0855

  • SHA512

    d2ee2ea6f18c4ed837a6605c44fa65d425ecd1a75eccec8a718f6dfa7ddaba043b333ec3ba8ae222034ad9105bf21f4253e8c170c9ebc45cf975fe0f985dda53

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\121d4630eca05f90721b70570d1adb14.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00a3db231c62e92597cd9f55d7464eb2

    SHA1

    7bdc83646b2f28e5d3b11d2fdf4a54e878508525

    SHA256

    4de0da97e5a3e5d99a1322c3b3298bf728164aa939d1eabeab06c2c50fbe3b10

    SHA512

    f351d6b613108ea977359008d65f3c7a0a043b271fbf1d825c95e99eaf6a7850063715486c12941185c519a6e04041ebe1b7dae86eb4b9fe7bbb26517ecb1af2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    096b4d12be3fb6550a8c5ed983609c65

    SHA1

    049f1d5b72454ab73aed059fce03e962e750fbbc

    SHA256

    812e129399d3bb57ca7f67524c34b3b91de22b5444747ad0e9ffd98b110be12e

    SHA512

    f6d2b32b2f3a5f6770e7ee3b85786e17b7320f5b5ffac22d0fcfdb29be187bc972e38bc9743b5a0bc65d3fc89e30b87acf36492594218497ab1d1aea50093256

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0130f895e384b3fdfa50541fb1f89b7c

    SHA1

    91f37866e504a0e121a0f323767130950f2e53ec

    SHA256

    7a5a30e5ce66bd155d8290f700cb2ff94199ed2e1c40a662efe9dd93dc08a3cb

    SHA512

    95f389f006e05c401556579e30c101aae707c410dca426fdfc42b458c2bd365bd9c7b69436b269ad32f6a879ca353e61e8473abf933cc42826cf53140d710bd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e510577c487fafc0aa4b15e50f5280f

    SHA1

    b75056d188a85cdbeaa27d1f98aa32ab559b4ee3

    SHA256

    2a00a022935d78e0011db0fc1399f65c965b64aaaeac55664d5309e039dd3b57

    SHA512

    8606662b18341fb1f480ade676838cf13a9e7fecea4e9e6427e5c2518d0687be5ed7ab9f9a6d043575d224dcb518182f291a94781402f4209a943de05b8848d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae10f22f6f6cebb4c0bfdf40a498c471

    SHA1

    c8e60589005d60f11d258d96a361bc049456c77f

    SHA256

    3d49efdc57c313f5f01b807cda7f94e9615d73b5db3af6c61d8ece1d6016e3e3

    SHA512

    b8187a4c153f7f34c177d060fdc3e21a50c2afa67f63b6420a4cc9cd0f8f18999e526daa0ced458b8c31b12d98abaa20ca47781e4191f7b1e23db8f8a0a2c0d6