Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 23:24

General

  • Target

    430c79359f97b85a6c1ac6a60f228974.html

  • Size

    18KB

  • MD5

    430c79359f97b85a6c1ac6a60f228974

  • SHA1

    34319a0c93797ad3d0c7fa07e53f585d086a1d43

  • SHA256

    b2ef17754cee5b8652039e3941a8a74f48cfb0978980984d46140abd12a17057

  • SHA512

    acdb4125853b38f9e0b93728d45275041bc57b3e734395eaaf58a0167b96ee318f1f7b6b823f69c22bb24e1da4cc8b32477a4d28a77b5987bc6e282403301d18

  • SSDEEP

    384:WQ6MoGIuEbtahr1AgdGgs8jMaztTLPAuz68MMv07X:L6VZK1AgdGgs8jJO8ts7X

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\430c79359f97b85a6c1ac6a60f228974.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3fd2edc634c53018e771e9cd78599064

    SHA1

    cba26f80da611356be02accc5e05ab18fe690931

    SHA256

    4b08d6f2f80e4100ca8b06f748678cc2ac81a7c221f0b98bbe1e001cdf69f1ad

    SHA512

    332fb4646d7344f803c6073bbaf87983a10aee0ec20c4d8cd1bf52a318da61782c0062ac7ccf6978d696084d53feee3e704981046613b01116661fdf3c2a7f60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c45810236d824ec42ba19cf6ad039178

    SHA1

    bb64e5d18385b77d7387ab6df11fb8cee852d498

    SHA256

    443479388a85100aad20b5062da64440f606d32858145d604f098cb34d7f0f8e

    SHA512

    ce67bb73ee66aa1524c2fd57a62b07944e3feb850b8c01d02c8ce61b61ae6bd538f303a31f0ae2b7228d21ce8cd64c1510bae94215bf1f7f212f756003864c9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97672530c2f43f651fe2d5c31ebd9a8b

    SHA1

    df1b028e82f3ff8bc16f48eabdf4709580b12bc3

    SHA256

    8bd28b2e91b02b7bb8b8d3b1a7c547ab35b71a3c9e4f42fa38240ec06a3e1eb2

    SHA512

    943e2a60297db1ac4f4410466b56d5ab9ab177370321f8b1147fdf8d8a6bac9c04fdc6fec3fd58cbc4de65d03852c272e87271f5c7e6e8c56e0101c79839658b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6e137ca96e70130fa74635d3706a4ca

    SHA1

    1c2688e27cfef2438a5a85c831b65402a5816cc8

    SHA256

    882e91594e66ac663d6cbf8561c7a15db27a94d79dce9aa44ab164246c4273ef

    SHA512

    9474dd1991736355eabe634649cede61a5e518afbbd8eb73868322a8a7d1e6a5c6f8a1c0b37c89dee522b5750bfd03186189ee6b93daa1e366df83530d46d676

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    57bee62aa0979ca6a9bec8262daef2af

    SHA1

    b0c15d3d34b2ce4b1f5406b5c5bc8a975249525b

    SHA256

    6a6c82b408192efe520fbd3c2abc8e32bdd4b8b6fc1f86850ddf368ce935e13b

    SHA512

    8801e6edcd0a22a53fcf8b2d4fb24ee94c225c2cd12d01b704fa5bd807d7c4282c4ab7bcc2c5ce4cf65655e865e4c297f2b4f36a88ac17faedacb09e40a92f2c

  • C:\Users\Admin\AppData\Local\Temp\CabC62.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d