Analysis

  • max time kernel
    46s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 06:58

General

  • Target

    0d325704cd1aed8910679fd96a82f0d7.html

  • Size

    8KB

  • MD5

    0d325704cd1aed8910679fd96a82f0d7

  • SHA1

    3f90677f7c34a09a9afe4dc38c6d12ba4dcaa0e2

  • SHA256

    e3713566aed929ee9fdf03da7c0eef9bcba43643864d0070945049583fba2a2d

  • SHA512

    872c28ed757371355c446d907be3f92195567761b21a8a41e3e24b572df59fbbdfae5b0962c3d3b149b0df4408df485c5e33dfe716a8ba7a5aa8bde1936ca960

  • SSDEEP

    96:uzVs+ux74OLLY1k9o84d12ef7CSTUFzfIOFu89lyaIsjMiIhO5IUFIDiL1I1xDRS:csz74OAYS/jOEtthbPPRb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d325704cd1aed8910679fd96a82f0d7.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2324

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          884bffb727c61ecb8696f682f7c2817e

          SHA1

          4584b0aa0342ccaededec0983a7bcf5d7189b3cb

          SHA256

          59161080456c00cf83dab7ebb437ea00ed18e8630de1f7a1304f2dd9dcd79f6a

          SHA512

          7122dc428a2ad706edba3e7ba2c145407d6a27d2fe301d5d247e327e7fc708fa245ff5058d0022e6d92b7757ad5cf335e81f7056a1ac5f7696199a4629737eee

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          9d5fb5b8641290ce7032b4003fb47990

          SHA1

          2867bb6bac35090470d324524253df95663fa23d

          SHA256

          3951162fe36f45754df5ac2f5856d2cf29734c5e791c0186ca3cb6b98341d664

          SHA512

          61f2eab033d081741282d6c725745fe72a791f178c1b4c583c92683a28eb06ebc61ecfea1b30cde907c6535e015efd94677940ade151f8ac15f06cf55b5ff132

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          562234a1948ef59c7f7466fe83d6379c

          SHA1

          8889b7104a2b660d39c3991c0177651fb0446030

          SHA256

          7508d82b825c72a0df462d8172c69c75fb488acf78cf2561cd98401a5a867f17

          SHA512

          d081274a467e1f4b4301f82f69cbd5bec9199c555e6549c0257a05a5783d7d92d5aa040597ee19634c4ede86cbe5d9160eb6870aa18f2978f7193d7808ac5154

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fcde4ec1e818c1dc40c565d4901ffe1e

          SHA1

          90b092e2c4e6c9422ace07a78ed67dc60eede5d7

          SHA256

          86b31f67ae613be32ed7f345cc18d978fc17abd8a79100d35ffb26529f59558a

          SHA512

          b30a5962202e670bd5026c7c9fededde41008fabbed72f2ecd337f2579e22c61c88b79033ad20612b1214f0ada54e20134a3359b7e745505e3aedc2433bd4c7c