Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 00:15

General

  • Target

    1c2bac46eee453c4930fc9680b8b23a4.html

  • Size

    53KB

  • MD5

    1c2bac46eee453c4930fc9680b8b23a4

  • SHA1

    80e2b90a933c095db050ed3e5f2d00d2275067a9

  • SHA256

    e12b6b14c32b8fbd996fa6d550407f67c209a97dc8eca769bd93cfce5468e017

  • SHA512

    cd491c51a1a1c50e270ebd621409cbabe5b6be03a4a36676d5d9e86113b9fb48261c410ac3a9a1608c465b8a0fc18cad0fc7c6ce533ecf050c937b3775a07d59

  • SSDEEP

    1536:CkgUiIakTqGivi+PyUcrunlYlm63Nj+q5VyvR0w2AzTICbbXosq/t9M/dNwIUEDg:CkgUiIakTqGivi+PyUcrunlYE63Nj+qL

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1c2bac46eee453c4930fc9680b8b23a4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2444 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a56b6661f6e6630a3474773912e46485

    SHA1

    cba6d9f21f5fc972b4c5136cfea4d4ce93ecd798

    SHA256

    59bab15d98e396c12ed088aa9082e2aea11187caeac7944416e7b7a052ba293e

    SHA512

    d5c4b473dba538974a47b76e321623a553a6c6b02d08590124298d1651b4f8c24dd55bfc1d83bcfcd6b87da8c55a954ee8ddbf809d0c83a13ecd322c79c275d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed3a65857b25c5c8216136d3a68edf1d

    SHA1

    7eeeb704cc1a62246be60d87603f897ae4a5327a

    SHA256

    1a89cc43199383e709cedf3cb67d9d2deaa70bde1e45174f53b77f7c84de6f8f

    SHA512

    f538c9450b81b8c6c2cfe74680f85285d2a9b998e3440dca0c8b811f0991505f2c6e03d570c953a578cc73ef5001117c8dbf3ef6ecf87d292e6374781b42ae7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef43bae8719f28065c3d1a185a14f3c2

    SHA1

    be458531e4854165b7d39a6747b6d0013503daff

    SHA256

    5d7ee8e2ae52a3fa13ac8d9de43d93b80014ea6d392f3819e927df64df3b62fe

    SHA512

    be514e7e846ffede8454673a9a024cfd499323b23648ba2f56c9551f3023fb4cd84b62f5ddefe74fcac9b2143f7eeaf6cf7c415a1d255f71c3ef521050a7d5ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b0d051843e4c111e5e1f054e3c052fe

    SHA1

    f13a9dc201403b529c7eff51c3730aa45ce17afe

    SHA256

    4e37e9cd1fca7731167af7e88f33039c4067954934d3fc0b07e59f3a36523e06

    SHA512

    5db745512296d82f20485ff0096bb1d93da31ab3ba4fdd194484fc321d346796162103a6893de288c29e964728d06f542a736909ae9496b8454a6a1eda99fd5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    98e4590a6c0be1978ad3caec5de9eb30

    SHA1

    a97d85ce8221d072d516c7c3edcbc3a983013b38

    SHA256

    86674f9c62a98de0b8e3b4895606e6de5b17f63d4725f950908e21b113cd9552

    SHA512

    4736ec0aba3ecb285a9c5131b08d7c4c91e38aa4c1c8603c5cc457cb3fea07a3d05c1ec4fb91e13bf0df3f706df342f53954c6d14294393b2700cb5840596d4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4cce22df281386b873c545f46c02ac82

    SHA1

    b603a7bec761d3db8bcee59325c63f297dd5b944

    SHA256

    0991d80d7876d83026c19eb894da29b60f02369b501d6de926f235e3565cf660

    SHA512

    b2fcde99adf58388a0834f9c72e36a1c3d77ef9851b55e035c009921a2791e17e34e65fddff461b49a48662aa1903eb32684bad62c1b3e870e60cb5f46bc18c7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\style[1].htm

    Filesize

    706B

    MD5

    67f3a5933c17b3ab044826d3927d0ba9

    SHA1

    5957076d09bacaa6db8ddc832b4fd87ed8f05f8a

    SHA256

    97e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64

    SHA512

    03ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e

  • C:\Users\Admin\AppData\Local\Temp\CabF29B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarF77F.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06