Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 23:39

General

  • Target

    43c896d65dbc939f3cbd7f1fa8196f52.html

  • Size

    34KB

  • MD5

    43c896d65dbc939f3cbd7f1fa8196f52

  • SHA1

    22bde8ae297c228ab15c3bc5553115e1084ed3bd

  • SHA256

    e34cf9e341c3d0edc8a5c96b937210f227ead8367fafa85b65b60dd561b28629

  • SHA512

    fe8ba8060791868126acb3a96eb822bd917de4233ad0dc62ef3e6474fe0aa3eafc4b8b53df4795a1e4cd3217f338728a6416501efeca830ed863bc0159b66128

  • SSDEEP

    192:SIzarisRMLsCyp4NrSYgSGTuQpip2JtvGfyFDsXBmPvIaqgcBB7ErwaUvaut6TxO:SIci3sCyp4ATTip2yeHip2SXr9+isU8c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43c896d65dbc939f3cbd7f1fa8196f52.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6bfb20471441a4b5bb4f43e652900792

    SHA1

    82b3e1f09555bfe34a058ccf6e38112dc2fbeaf3

    SHA256

    1c28f45395add420edcf9ccc2a08433a07fc79cba8680a579661f95705445f72

    SHA512

    e9731a90b6b24a74d2121d25cc95a99580e04ed749cef6e11bb96b77557c7c9c4c0ee948e8a6453f68f821dc0e6cca23291e73b0b6690a3cb812edbe0e488efc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01c8f72ffbb183dcd35488aacc078f92

    SHA1

    ac221c1c152d384194724afa200bea0c930f6103

    SHA256

    eb874a2df7d7901418fa0bfc12b5282d323e6a33ad9af1c569df045422c78255

    SHA512

    430256591b6165d8310f7cdc9e2c12a16bf310e7c49ffafc986da19ef9195a7b3a10d1fc963f454fe5c4ac7fa18464b9d938c64e099f3e4c2e1e7c96ab09546d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d2140bf7ea958a3f1271a4dbb21fc441

    SHA1

    52d678266fb55a82f892b3ff3b66ccae3c1f5c70

    SHA256

    36d998257171fc91d8b21ea70a5a4ab0d333e4af86bec1c0936e4b95f87b9d60

    SHA512

    d8177e5a445d31a2fdb15c218cbc85bcc463e1dd6b1796fe79c95098cf85d2200d7ca468453f3de37e5a2253d81e44eda2c6cfc69b018b8610034b5bc2c3f747

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    70683b4dbddbbc3c7a0c55b448ca604a

    SHA1

    b754d7a9270e1977c56538c696ab85e423918d14

    SHA256

    c4abc53abe036296f6fc4b2368e1b8fe581d00811c9a84b84065df2e40f4fa93

    SHA512

    58b7377c8df05feea1546948ce6dc3267dfdec0e66aff0b083dfc02e79e9249a2f5f20da1099c91297a549f182a90cb369a7c531734e03f3d67426e2412e3b96

  • C:\Users\Admin\AppData\Local\Temp\Cab6866.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6C40.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06