Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 22:23

General

  • Target

    3fdd1d061afed23273087b923924f7f6.html

  • Size

    51KB

  • MD5

    3fdd1d061afed23273087b923924f7f6

  • SHA1

    9c7f43fa13f13bb417ec61e2af9223f18b821419

  • SHA256

    f8a92770a3b103058c665c25329669c41d5129f8cada09cc8b1eadae9c729a5f

  • SHA512

    bfb6bc75dd31bccb0f37581bbcb80f1bff06d8aa6a083a87ccc1d4fa04b79bf80e09e9351abe541bf8bf3137d36a9db93871d9fe4ce4248a30eae6c0253bd384

  • SSDEEP

    384:qr1C8ldpEt0e6vSRkx0SfT9lnApnntn0d60+SwkNS0Njf88cVHIMu0vcTw0cx9GW:qB1jAcq7hn+7w2Vz4Fx

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fdd1d061afed23273087b923924f7f6.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c7634183879d9f1a34a49a6c26b8b056

    SHA1

    2f150df6b5a010abf571023d4601fee1562561ac

    SHA256

    0c6aa988a22521c28f8ae499a7c0a161a58bd17c76220fa30edde7a3653a5995

    SHA512

    6222f7dc24cfcd00619dae583fe50cec8e3324d0e0269dd348ba489548a00eae5a79bdd2f328eb1b8b7f2688c6aa7aa542ca83ab399d242cae0016d2e9bc5922

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c5ac72479526a6ee3e2ce3730f30a96

    SHA1

    33581d21d3d62a5d46e7ec9b8a485ff7578e3efe

    SHA256

    bd438b1c4c8e6d7187e36a00de1e1f87b20bf93c9ca2697960f30b116b2b2f12

    SHA512

    50115bc466cda38f5eaba6a9ae6b8e4c859bc05b95ddb531b9b05265b8fd93570904e8e0c5a06f83d4760837e19ee28d85b7b47b0e03fa8d6cce75c02714acf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e468da6bd752d2541b20ba1a6d474425

    SHA1

    87d38e59d6dfda9257a898c2aaab01dc1ffd2e30

    SHA256

    a6027ba75b62e98c71f68fa20770f4cb13d6e7f24b0e6c7a2e1c3c2a3c3075c7

    SHA512

    4550a0ba0467b5bb407d60041d72b6ab3c49aadf0612abf29c915cad4b49381345e8ee7e81e6fd01c5c2745c27e37f1d60c0334b98c20e887f13a3c00e136a3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6ba62d8f8b0e8829905b6fed1a3a4e2

    SHA1

    5840cc7785547f1daf0ea856e1da6b168b715e6f

    SHA256

    e211668887725229c520a3dcd2254969606ff2bb3f496bfd4c8f2f01d9ec42cf

    SHA512

    0b7ca1f0104a4a67a7a9f52161c175b67cde35ff307ca51f2241b590230fbb67665de179f2735399ff72f6bd8d525603d3c42eda11ce344c209c6a716a84d4ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0d181269d838da97d4fc5ae7aaae753d

    SHA1

    11b683934782b4406791b82553cc67987e813597

    SHA256

    f26a0e90b5e68aa3afb6a8986e949014f51abc85fe28d1761f0af84216ed2afc

    SHA512

    c17f730c6cfc08e1e810a48f6381b0a44bfe80b4345592ef1cd9067054dd71cdb5feadefc8e7de39d1196a3bbc45814799b47983058bb0fab3c25b51d1be5cfd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    18db9a37cffad617d4e047110564da8a

    SHA1

    b3347ab2986a982cc94be69099513d5bd6bd82e3

    SHA256

    904760670997d9dd22779678c0552ceefa9b63a92ff303218e89b5a438e8cafd

    SHA512

    4fb68061dd87308229b99606f7f5cc924d18161343df93aca0177c8480fc660dc4a04c120a97b797a5aadc297cfaccbea7893667f22225776c7aaaa4834cdf67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    51ecd247c12913926437a998b0a285d5

    SHA1

    657dcda9fca09c62fd6a8e20ccbac1853d6c3daf

    SHA256

    356a3428db7b85b79d0efc3f1175e9f22038b5611b10f2389961f3bfacd31055

    SHA512

    7d30a7ee75dbff58302216b3fddf887947e4b48dc8ceec771f9f6752a97932cb830f6315bfa8738e6c7222bc203aabe481f132409cd318a50f22c6303c023a70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c74172410d31f4c70add2fb1cbc50c7

    SHA1

    1e8128229f1a7d1538d0fbab83e20e77b55104ed

    SHA256

    950a8b89414b9ea4bd82547ae89d19f07ef1289c577f87801d50e7f379ef11d4

    SHA512

    5839be5be36643980f5afc4c72d5c4305ccc1d035cd0086399cf4ebef6e70808ce544937abe8e4158ca7b251a279847a33f3818d9c5f23469d38c00822ac8426

  • C:\Users\Admin\AppData\Local\Temp\Cab32A6.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar3356.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06