Analysis

  • max time kernel
    27s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 07:31

General

  • Target

    0ef87c1caad70501725fbd232480ad82.html

  • Size

    20KB

  • MD5

    0ef87c1caad70501725fbd232480ad82

  • SHA1

    681361df8838c708629dc56be97d19e9d5a8fd66

  • SHA256

    d93b7558046ee2d1831cf8a2ca1b5aec28ed31bb57f65ca2876004a80f7f1a67

  • SHA512

    55d3c7db5514faf603d8b6b5f973b4582cdbb133be7aea3981af61dac1ffb271b3ee6f24929c19fbbf7122c0cf945b44af7fa8ec4e59a9a1482aa5cc383e9efd

  • SSDEEP

    384:9BDSZS3kzBbfaUu9M7puAM+nSS0RsE8JgJBMTRyz:9YZS3kzBbfaUuC7puAM+n8qE8JokK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ef87c1caad70501725fbd232480ad82.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c7adee5b3291c93913870d09d1613c7

    SHA1

    ad6b4422bfc24369b4d508d27b143e1111e6d01e

    SHA256

    d49f67f81ecc263f36da6538b8fd603087df546e5580765a5b79bbbceaaccfe0

    SHA512

    0503e36e5a263e7fba8a9f9eb25d327fcfe73e4c1378f811e6968aa5e35350c20c95b19b698c420626733e26847351428c42c4ace778a7acded97e556fbdb3bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a4cc43a5bb07739e5f9da5bf2c406f2

    SHA1

    d8c6e05c9f88a9d12ac8076c3663ca364df811a0

    SHA256

    57ee17f64d3211e1cf4e34b1f4dc5ae2fb2754763f83f77edc14795f8a35a517

    SHA512

    179aca53e963216934949e721e8ac2767682b7c949bf560a09f73aaae2923b5fa6e8d29daaa6b878b0fd0d30298609c485a80e294f5464c0034d91de5f7635f9