Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 07:02

General

  • Target

    0d5e2d78ccca22568f8f373e01369e88.html

  • Size

    58KB

  • MD5

    0d5e2d78ccca22568f8f373e01369e88

  • SHA1

    bc1b2f4668f740a72fb6965c6eb2ff7eb54c0a65

  • SHA256

    dd3549f18cadb9f43ed80cbf6477a1ec418af41ee047af22cb971557f0091fee

  • SHA512

    f3bd9df009c07181e0598d2d43fc2faa979618b3ef125693a82d52fc98f8596db3e8bd9debe57757daf59826a9605373bfae51b7a69dc27dcf803aa94ec49851

  • SSDEEP

    1536:gQZBCCOdP0IxCYDBMf0f0fMOfxfIfMfkfWfofEf6fvfjfwftftfSfqfefRf8fOfZ:gk2J0Ix0csUOJQUMewMSHbIF1Ky2JkmB

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d5e2d78ccca22568f8f373e01369e88.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1672

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b87d1e3c5f5877810170de2507cadbfc

          SHA1

          a8fcc92c20ffd75d682272cc5d248f45a3894ef6

          SHA256

          593d5da759d52179de63ee6e47fd063fdcc74b9abee998ba51a47ba8c25df27f

          SHA512

          d858e69ecd68f1ba9c2b2b23891cb02c8e3965d768ed9c39b8daa4cf4308a1074cb2834bf098a4b39a2fd0b32377216f954e1b3b4316bad276c99ef8e64bf0b6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5ec2abad278bfbca8343e0756f6cbae5

          SHA1

          2ec7940e70b4f2542c71ffccab7b204afac099e7

          SHA256

          c0139c845305a71e1b46b88dca6059ae9372ad8056f078ae3f8c858ab0ad6ac2

          SHA512

          7873b37734a9f4e3fe4bc0903e65f29671e0311051a92caffd64997d0a25a558427487c3ceb48b98f1908f50988e28fcbd15234adc78ce2784f656223a96c186

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d29835cf652269b402014a3506e9cb78

          SHA1

          6d62556fc677b43c4db30a12041f9de1490f11e3

          SHA256

          6ca0e3f4f863918fe604382ce905f18bf81daaaddf03ba07d623b1978b26dbca

          SHA512

          828c85dd1c3a0c611a10e86574373c190534bd99012bc014a6a8302900b52b40228fc4afa15b1c03a82e2b41b8d24e5fa99860e2fee056f075376b7639d8e44b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          16c44f9b31206a2794a66b340733b1e5

          SHA1

          eff21282928b2efe11c05ea9b0a2b0b73d400b7a

          SHA256

          66fceaf3b5ee7c6fedba27d8162446d5ebbbbfb8338c542d96e5393fbe4afd79

          SHA512

          d7108328c08335879869590d030cb9d7ae18424e6bba1a64e258eec28758762969fb8d56192d150d3eb9c6d1b1c7dae1af6a7538c9784a14345f7d62c20b1ece

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          410f484587b7462574fd387b97596cb5

          SHA1

          cb76369b8931e34771e44b22d70e0f7b94fa61df

          SHA256

          956a37c46af02626089c20babef6d190d195683229fe6f15b236f93095f5e484

          SHA512

          2078221cea8fb6d1e8bd6a12dce9da45203ec9e6c69691f5bb8d8db3a0c0e22ecac8fa3b63bc43c3dd59dbcd27135aa34699038ffff60106b3d47ef7a8a42d95

        • C:\Users\Admin\AppData\Local\Temp\Cab120C.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar121F.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06