Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 07:06

General

  • Target

    0d9edd781fc88bd1151ab125d3aa0ab9.html

  • Size

    52KB

  • MD5

    0d9edd781fc88bd1151ab125d3aa0ab9

  • SHA1

    5a62ff87242ccd6cb56b67e0ea8c5099e5a25d5f

  • SHA256

    e6cdf99ad344b83810e945dee259b507f53c5842c29f68d2148f3fe3bfa9cb70

  • SHA512

    449d33031e4ef2773d82f4b6f1a074f55aca543de3ab073015c0689f24533372ca8887158104f1ca2a8f2d7f4ac6eb1d3046a2c23e6a84f7b6692fc6850bee2d

  • SSDEEP

    384:rpwWbTkpsSvdO+e+WD4TKHz3hxQzDVBELn2s1haXrFPwyufvWhVLyiIrP5RcUq+W:rpwW8/A+eFw4UV7CluIOfXInddHIndr

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d9edd781fc88bd1151ab125d3aa0ab9.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e8075648530696f8e96985a62daca5f9

    SHA1

    21389e38b63554e79aa70b18c866e8b8c4db3c9f

    SHA256

    3ed2ac54fcf09be30c2797c861264f059c8797efb15e34dc10cf02da3f6219c9

    SHA512

    f62d04563802eaf3216b8ddee1c899f9e71e967821cafb2a54eac9a149c7e5f62875d0123f045965cd53f9693227ca92a46a8b44dfc8b15be83c44ead0d8007c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71da6ad4bc8dad63b9d4df8b712789fe

    SHA1

    4c2da7c5e13cf44f6d1477dbdb86af81312ebac2

    SHA256

    8a90e67c48b7c2c66e167061920539e4f94101846afa73457eef50abd358ddf2

    SHA512

    26c4d7d6f33f9f97942dcbefd95cbc468ca1ea885c1116561cc567d1ab1701dffa7257f2b7f95ae9e586043aa0b60387bc586fadf1de9eaad8fb5ed3a9b2c4b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9962471c9ddcc60ae78adcb439c81f9e

    SHA1

    07c935273934c92b9be9e6ab689bc2842ba8fafe

    SHA256

    d02b797f5b667de2d2cd69328a0febffe61cc6bcd8e675422ebad2702f0aaea7

    SHA512

    52f348a3eac291449ee54c4c76974a4452d929e5ff268331a9869da09b3270aaaf0a46ae70e3e9be89a61a11c03642f3ff0e507d8d1bbceee3caf40330d9fb85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4610228d14efb7ed89ddd85a92bd3e1c

    SHA1

    3d55c7d007aad3b9e5055610995551c2b92d9831

    SHA256

    b5ec5c76f3249c11586702f86da98be6c4d6e7a6df2c29ac480a0a036ef1086c

    SHA512

    18d1bae874877cc8198574c9e876a10a5f7847efc4b9bc34b24cfc34682266d0e809de6d8b9ec3cda3d515f5d9e41523fec209e27120fa9b1c3eec878f03db29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    997c2f0c73c27d82789fe413fa338ba8

    SHA1

    ce0fc90336ae0f4ae958921e83d13ad483541126

    SHA256

    d5b21a67dd7b22122f0cd03c8ac6d569e889a089d8f7b53618d86a247c66bbff

    SHA512

    e91a4b851129a23236e6e877f54ca411c80dbc14b8ba2e4472f1020cb4be4eb6a3e8bfa5eee97fb5ef35c85a67ef67de9c1e80bdbcb566181bd6b5ee958ae31e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    286847988eccd79a6d43be66915b3442

    SHA1

    2134815ba3b3d7f4786844c6acb6024d507d2986

    SHA256

    27768561279e46b670c9967c2fa98c130eadf4549259d52b573fa8974b8c28c7

    SHA512

    7bbe56c82845ce70beb335a500f5e685f8adad3b0493c872f4107732837f119343fadf6e8d89d74be252dff12e6fa9fcf34d66f1dcfcf7eee0f8f358a4eea97c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    98fe92b6099f2774cc480a3c4b55274c

    SHA1

    3cbc4fcc145cfdd026819ad72759b5465ad45de3

    SHA256

    7783bb2babe061c921f5c6273ec5bf83da3fa9c5afc80230ee9991f2384c371f

    SHA512

    64deecaca03b7ced87da3dff4936865715ec8ca97019a389cb2310cf53f96f31a701191b741421697ab833ecf7c7f49f81548479e3b2a0894708b127333db04d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    540747af3e7727b4b0673619c0f41039

    SHA1

    4b9dd2115c489364b12f78c6441bad24705b3909

    SHA256

    cd4a2fa5d7c820d86ac1f48ccd716982244c071b0fe2520056e78d2d87c0d8b9

    SHA512

    c317618a2b0e19e60e7742c021ffe20d6fcf8abaeb3ddc70e2dfb89e06d870bfb2c7743f072b05f5cd9f07b5df3ca6d0074d1c9e2605560eb8e22191300b90e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2e653dc0e68b3f34e60049ead2bf9d09

    SHA1

    019bf87541bc569343dc1b1d2eab7e83dbd45755

    SHA256

    671b15af650edbfa82cee663060f15cab0822ac26416f857e6b680f6b23a80e7

    SHA512

    65471c7f25e6dab2bc512c7dd8a86eba976603c5da7eea2ae9c9e23895eae93c3f0024a40ba2b645f7ee088f30900c38aa70abc005b75d5c25a8e6fcb55935d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dfe9818539431a249c3c8c2a056ecfbb

    SHA1

    08931bd2667de054aa3aa5a1a0269b6c90b75a56

    SHA256

    324c1bbfe410002355b9dff1efd03fa23bf0e4267b2ae32dd8e0c33dfac62c79

    SHA512

    3f4cea3755c5ee55dee7554374e068403227bcb6cab18d8ca902cc026bb520a446acc96833eaf9def2ff245c0964f7c3b4735664bb9b682bedefb0358b8aacb5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HVBRC7A9\f[1].txt

    Filesize

    34KB

    MD5

    94baeae5a431d3f4b6a82c4a91f59511

    SHA1

    42afc199c30c4adf7d69bb10cc1b7674102cad6e

    SHA256

    df5d165b5af8ba63c3b606253a8c73dbdc132bc66153c867b4acbe47efa55f0b

    SHA512

    866c5064e7a88ff99696a64ef6cb3a770db74ae99d773754613422f6fc4d850eb32945d57aabcd0cbdbb9bec74ab2627a7d7a0cd14bd465086db0083756f0017