Analysis

  • max time kernel
    136s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 05:43

General

  • Target

    08ee67aebd8e540746157bda256526f4.html

  • Size

    1KB

  • MD5

    08ee67aebd8e540746157bda256526f4

  • SHA1

    d168df94fcb30da0223194c89caf21cad5b907a0

  • SHA256

    8dc944c8c125c543692bd046e5df0fc2304fc74e9942e16620815d0232fb88ef

  • SHA512

    6aa6e2ba2a046566f7b0c3fad1a03065aa76c12c17ee13d1887ceca9340895fc6e88673c255c873372fb0cc05c04ebbc714706ca5ff08272252b0c1085fcfd16

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08ee67aebd8e540746157bda256526f4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08afe4d9f2976c64bc21f97f6efd4fc9

    SHA1

    3967f6d1e7ceff8a2490764fe953e0db91f7a112

    SHA256

    8254418dee5d6bdfbb86dc96b06556810dc865e24f9cfb872a649a7c8ef47eca

    SHA512

    f8838853b1d58f9f518d1f848418cd929a04ec77dbf1e60ab90b62df1e03fbaa568e7b34f8eea06a4d14a9fb68a880794520b6cedce4040b5a462755cac5d657

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e9134b0a80da1e9ebd84a8d27af83165

    SHA1

    9de2f2d05b7fc83c6dfc8445c842bc97f03fb019

    SHA256

    3552cf080b1971b95ae88004f1b368a7da38ee8d51135862c50f7b6448ced047

    SHA512

    2327aab84c29be9873ae5bccee7883f254564a79ae2ea2c8d84aa66afc44da2db8b7fbc4e84b6d3af768baecbffb872687cc92a4d5143cce9313e2ff13ee48ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    de5e0c2b9720b5bba8fa4d8892d0c897

    SHA1

    ef67f9073db1dac8e8528a5a4169fe5cef5d15c7

    SHA256

    fc154993f43c765ccf6fc023c70bf88d0bdec7e98edc181f0bb336400ff54330

    SHA512

    cfd7a1d31d0282ba1a2fee22dfaf60be7b4e8389924ac10996fcb42f7ef21218c02c4b0b578a7bfa2c307d1f453107cc38bce8f303e83827a056dd03120b53c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4f6fa888571438d6da91cf02db72a6b

    SHA1

    93f38812efcb57edc01d136ea30f6f043c57e2b5

    SHA256

    5571fe82e2dad0a39f74518916b971cb5875d10c48329e0d510dbf91d46689e1

    SHA512

    dd538e396f24202a5f713233b48ba6c09b9137b58bebb496c146673c02564fae92b212fb9a0260d0a58df191d8f5e6d4a938e876f0c723437a1d9595ee6f89ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2811b287d3fca086b8640edb53f01dff

    SHA1

    f303e34d0e3017c0d650650fc03cb2265009e923

    SHA256

    621aab526d0adefa6e55dc20985911a9dd60b68b2704e0d1a2886a9ff56d4ddf

    SHA512

    bfa1502f072bb1861316d76006c9eeae23780559501e6a517f8fe82ec8691b52ba4a34b14fec1de94e95607f2efc0de8288326328fda0c33af1b379e73802ad5

  • C:\Users\Admin\AppData\Local\Temp\Cab2B38.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2B4B.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06