Analysis

  • max time kernel
    1s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 22:07

General

  • Target

    3eff5c646449522540f0dff24b4ddd7e.html

  • Size

    3.5MB

  • MD5

    3eff5c646449522540f0dff24b4ddd7e

  • SHA1

    90ae82c3972ffc5b56c48163036f448a7612218f

  • SHA256

    b2facd638bb2006c2dc256fc115e0e78a4b57095def1a164408b5e35d1b8248a

  • SHA512

    da4084252a80c97fafbb06103ddbdd3d06cff1ae0a85604f453c28a36423032c26f9af57956892273f4982df68566db1c2b6f1a6126de81a433743cd4604c667

  • SSDEEP

    12288:oLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nf9:ovpjte4tT6N9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3eff5c646449522540f0dff24b4ddd7e.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b65f5d640a280a51c00231e51351222f

    SHA1

    2c5529d1abf0e4b8798c07d37159ff96f997e758

    SHA256

    1ba0abbb81a3132faaa232d9c38acb2fa1d3e863313214e808411302ba15115a

    SHA512

    e67d95d950540c3a2dbe6281d562fa96c276522db5ba8895d369a38e1678dce60b3b1485678da5ca15f90a1567b43d6619a4f24f3471d0da8ea631fe712d6359

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa7cf3695525370a1d17b2a82b3f300e

    SHA1

    ccbc5251475ad3486d92276cffc3707c529a195e

    SHA256

    ed44de86eb5b89b0c01c77a3096329db86a6b1775d613ac6d0df2fa3ab09b0dc

    SHA512

    8ff2795327494859a238a6b5ee945d332506cadb9c43d95c5667d1b1c620a68c4a77eb510f7f10691673efaaf61bfdd0a3c95ed38428443874c07c3a898caa3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ab8d233e953ed1362b648b4704d29cf7

    SHA1

    ff04a27883c768deac30093ab69ee5685752bfb5

    SHA256

    b0754ce45419d77d7537c58d1e026fb54f7a8f01ae37f15bd04c57e5f2f92b48

    SHA512

    c22092a88df8029f4f78e51c7062de95bfd43e7775dc709a7548f344bb86e4e40868a17da89302752190b0f8e4817b2eec8a646f59820c1fcbd14e2584cf81ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1fa7fc1f9287658729b4907fe0489f67

    SHA1

    0e9e6150b019add1487b8ef46458b9762af7d269

    SHA256

    7b65f5786b577951fd56ec45431687739f957c7685b04fff351547eeea85d502

    SHA512

    dc07ec4a01d1ada702d44455363919e8e7df2f8e7064a31c5e0ecb92be1e329b34801b17b99416c79ddb1592577bb1972b84b979b39958c82278999e68bf0f49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b2ad0b3485eb8b3890899c61ebc3aec2

    SHA1

    7343f621adb896c2db8e9b6dc31aaaafc3107112

    SHA256

    770e3ebb9c1387c55c68391cdaa9397d134d0c4f9a966a9e5753113038d6f783

    SHA512

    bd0e999c2b2757065702483700211f8aca1ab346393edfff8bd78be22d4cadb0152e52277a657a89117c98d1c9b79772210929433d256653441bd32e79a3d5d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cdfbc250dee08375679c88df94198822

    SHA1

    a98b91c22252978758d451f78ae545b8382bb600

    SHA256

    a005df8b809e236c88cb71c8f4879043f2c398303004d28d70be5f8852010a5d

    SHA512

    565ea17bb1cd9868ef367cadb7b975505126ee96bb7053808cb1497dd5a213342e02f99f08671cb0d43995ff144c22c4f77e9e7ea1319d6d2c9b9c929ed0b8fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    5a64978a150f536f552552eec1806baa

    SHA1

    128916e3d3ac2b7dde98df1917f93a8ebe54d01d

    SHA256

    9304f50a87deaeada515a1869a7a9a0edb54b4e365647fc8ab11c69953e0e315

    SHA512

    3c192814ae0d5db220275e1e337381ab0af3211477bf12cd6f8ab8021028d66974ad247d8f57459c58d9f3c1daa94a4ccf3aa63153bd8b6ede6a01811b943066

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    1ba59c2085f5ad962e92c4044525ec68

    SHA1

    3b8bc17d63bb33e051eb287f067463e987d09fdd

    SHA256

    7bfc67e85a03e9499cc2149002ecdf299254e03da01ade9cfd03ddf1b14315d8

    SHA512

    fa1605554a3998c4cb53f6a2ca7f96b261f831d0668bf22137973c6c2961641d9454843f35951305bb17c3b60097e444e1fd8082f271488a120f804027338045

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QAOXZLTT\jquery.min[1].js

    Filesize

    83KB

    MD5

    2f6b11a7e914718e0290410e85366fe9

    SHA1

    69bb69e25ca7d5ef0935317584e6153f3fd9a88c

    SHA256

    05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

    SHA512

    0d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R4WCZKTC\jquery-3.1.1.min[1].js

    Filesize

    84KB

    MD5

    e071abda8fe61194711cfc2ab99fe104

    SHA1

    f647a6d37dc4ca055ced3cf64bbc1f490070acba

    SHA256

    85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf

    SHA512

    53a2b560b20551672fbb0e6e72632d4fd1c7e2dd2ecf7337ebaaab179cb8be7c87e9d803ce7765706bc7fcbcf993c34587cd1237de5a279aea19911d69067b65

  • C:\Users\Admin\AppData\Local\Temp\Tar2EC3.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06