Analysis

  • max time kernel
    121s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 23:26

General

  • Target

    43241230ce40a484b7e0c83351bd5c02.html

  • Size

    44KB

  • MD5

    43241230ce40a484b7e0c83351bd5c02

  • SHA1

    46d1f873a780a1ec37677cf42ae950dbcd0d8762

  • SHA256

    4250d261ea6700a9b6f442732c329ccb9d498019a8f04f30b9f810a845ae99bc

  • SHA512

    54b8178912bbfce46fc6f6cb29709c2686ba288c5205d3b2affd49b614f4d239225ed0ef8d858e13bd32ce0675c75b1095e5555965aa935c3f1926c42649a9b0

  • SSDEEP

    768:vsYNIHTfjy+7BGu5VE5B8cOHxSRpicsaaUdboOC85M85LuO:vAHeurEf8cCL14n5LuO

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43241230ce40a484b7e0c83351bd5c02.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6398c65b0d89a01f33a950de83250025

    SHA1

    cc4c19c4de2cfb3e083d8cbc737ad3e8327e5739

    SHA256

    80cb3017d040df244a58449112301607ebac0d99243377431eb44d974c21f657

    SHA512

    38efd1250f32e94a1352b4adef7aa1a2c0137454961997f9b3124f63e605983bb29f4c39ce5b9b2dde7671795668d32260ee576a13b2a455f7b160aed4c6e432

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    195fb20a1c39dbfd2266e951a13ab454

    SHA1

    da5b23de42a221193ed0ebc9894cb8d2381e7fb4

    SHA256

    c42355dbeb6672667d10864295ff527dcb4acb441564c2a439b5c5555670036c

    SHA512

    b17b226af840bb913fd4891012f1df577219d99325ad8b56f46919d339db4fb7f20a7eecde41eb4623120f7becf3167e9962ecc446dbf2fc23270d227f2c0e14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6f33e8fa9494dd4e9973a11b50fd3de9

    SHA1

    856304e6059dfabb672bbc7dc5f9124f712977ba

    SHA256

    f6668ed078481497b5fd5fbd633d64d38f2c8dd6d8fc83edccbb713c3b697a4b

    SHA512

    7d34ef00ea7ee54add4c841a9bf3f33d91ecd5f692dd2b898e9071c792d5bd5522605ab52549f12d7d57f59b995d677cdc9f236469abb5167c591db63b1246a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3cc6a4a2959c9423a2cd8dc7812956cc

    SHA1

    429d2aae86c488e073d3d979a32106942631142e

    SHA256

    780613db11c48ef2feee28991d5dafa3aee8ee36c57613db6082759e40bb7890

    SHA512

    439b5a003be2edf8e2990a27ae5898fa65be9f9bc8ece773db2473de91de545a73a25df4886a746092274cdad74725266ea7de41d98bd09b90045a39bb71c593

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f034cb22885db0e6f328e987f78984e

    SHA1

    6fd3791467d3759d0708f94cddecfc7de2a316a6

    SHA256

    d704a035a85a382ddaa81c740dce0345a7fe33039c34d777e06182a7ac05e75c

    SHA512

    48d971dd2559d5cee42023579d3e3f8651d0c5c3af105d717acd20a382e6f3d59c78c135598dcd4fe75186f3ba1ab6ef1d7d2bd66391739c8ff394fa631122ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1bbaac13a391fb10307eba79b968655e

    SHA1

    40d9c76531bd3f1f4bfc2f2d10f58605e311306b

    SHA256

    63fdcdb79d860ce9f41137a44b7b691e1181925b16ecfd9c0fa11784eda1bfd3

    SHA512

    b0859c57498bb5dfa3c79133bf19f05ccf7dbd4f462a91eaf7ef3ba241ee63711f062d26e38264160e7e1f91e93fb148b97d398f2b90a1eed8d4a1528f1be316

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3a9d4d5b4180a610e80ebddbe4b203b

    SHA1

    34ea6d305cd396ce2ef13a71706b53c74f3d2545

    SHA256

    1462fce25e5201bf8ae725a7b627dba6ae6c9b368c7c69e69b54602df8bc12af

    SHA512

    925c7058dfd71d30146d4bf4ac4d5caa140ea1e14306e26c6f3cf91c43bcdee50262711ffbcfadb2d5d900cf5fa1a3b2f5cb5f8eb7433a185dba2ffe225f6e88

  • C:\Users\Admin\AppData\Local\Temp\Cab397B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar3A29.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06