Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 07:48

General

  • Target

    1000a3bf39f84aee17e79fdf2804ce1c.html

  • Size

    77KB

  • MD5

    1000a3bf39f84aee17e79fdf2804ce1c

  • SHA1

    af1e74e1411b048d4bb3215f2e26ef578816771b

  • SHA256

    7ae6545b9655b0adef0ef88276683d1519d4554f718ab33f93c27fee6747348c

  • SHA512

    6e267496dc51ca404d60633f8c542877f46f86d522f548e4db04ad7da77ed70819946c9e600f6d80c3c8d04ba96bc40bdc412528b703b7e24157b518483b8494

  • SSDEEP

    768:Q1hBwks4x4CGhB8hMUPVcPa0+9rxb2ksoNUPBUPVSGn6v28saNNUPOjNUPEshBU9:QuToaUIAUIIcUIhUIbUIvUImUIxoot

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1000a3bf39f84aee17e79fdf2804ce1c.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a96db9482a389c472dd7a0cbafa8992

    SHA1

    103ad81a812a0811bac4dbb01c1008eff7c1acee

    SHA256

    eb8112cac720bafdf7958187c2fe9d0bf3af2865b73b8756ae5777451ffe0039

    SHA512

    8a32838ceb0837f7a038208c10f833aa48bba5f92d83053a04fe43276ee9c793441a1c4fc60fdab3b9514b336370a9fe99a4c8ad091d36fe9b1dbf6734678789

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8aa695b0719accfb812ee74229bd3441

    SHA1

    6fac6d4ca99da40a1ee8fd49d2622d7c60a542d6

    SHA256

    c3ef5c8a66fad9a13512b60001583533020d8e12f8d8e175a14af5825deea401

    SHA512

    744ec776c21478abd5868d0409df2396a91557d4426321faf54cabe093aaf44e85608bc8a6efdfd6ad5dcef6a84df08dc5fc6a5888dff267f0f07a9a2f403636

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    087b9a2e5e0f15e901da3112e8be514d

    SHA1

    560d7979d83de9129fd1149e7122ea490f9da1df

    SHA256

    c3d6b2eb38588fe06ecb50b0a4d570a8fb623e7d1113c48c76ae3f34dcbae667

    SHA512

    b55e280ea1acc48bce3514046f8869a5290fe717f685d2e17aba765f5fe75d3465f0f0d31f1b01510c4e0eabaae21e831f1921a3ccdb00b756d6c1ca68736ec6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1296184aca51916983cb6c01386fa5e5

    SHA1

    e0ebd51794112c4f6024ea24792aaa47b29dc63f

    SHA256

    4ec370822430a720ea87a6208b3664b3af5e57ba6229eab210a9e30cfdc8c0b0

    SHA512

    960b99d7fd960ca2bddc3f4bb6c5bf6aea4887f108de04e3bcaa2a50e87fd624d27b4b2d4febdc851c1e048facd3d0e27d03f3335c242245b4887223738d2e6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    994156d03019a20c7263bdc33d5b6161

    SHA1

    826f1d6121aecab0411ba6ac584af8bd7392d9c0

    SHA256

    681aabbb20c90864837e34e5462f8be9d922953f9e585ff808a25aae17cf5c79

    SHA512

    47ebd71e205001563296d71774341e2ebe204a6c4f0d8dbbe8f2204cdc716aef3f0728b61bddb5342fe19c15a5c93ee077a5e1bc691ee03b0a8d9db3412bdbbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19bea2a362a7b4cf376489faa528acc2

    SHA1

    df855d240b29133a33e5cd7f3612c5d3bb60f512

    SHA256

    e539e1ea31895cabc97bd972e5353303f4a5fb46417fdae266d796c27d4e80e1

    SHA512

    58416057787f1d43691350c7a9a9c247e86c6b54c21779ebc5741166f0f8faf61911fab4fbefd5292012b5aa7c4098e606e282a0570a07a3164601638e6f84f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    173c1cc8786d01f0babcc96ac761c25b

    SHA1

    10c710e161402c70af6500010a7e65567d02981f

    SHA256

    331c8fb0d37b2fc8f2b4b255120b923f7f01e2635213bd732e7d8b5800ef4a2b

    SHA512

    49c72e2457150ba6b7fbb7f652bb252bf51440f884af18af9b22c64a542e6509ee8cda1a023279e156ae8a5a2d63564146311a143815e2b565851c8399ae4e1d

  • C:\Users\Admin\AppData\Local\Temp\CabB53D.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB61C.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06