Analysis

  • max time kernel
    251s
  • max time network
    289s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 10:09

General

  • Target

    1632004b014d3c7943ea52f15af5365b.html

  • Size

    16KB

  • MD5

    1632004b014d3c7943ea52f15af5365b

  • SHA1

    67d4dc02f2ef9e45821a7a7fa6041e131a0fd958

  • SHA256

    e09eded7572e507d02b6744c374cb2a02a9d51534d6cb2f21adb11636bb7b44a

  • SHA512

    7bfd502d0794c7f0ca2e47e87dc797555f27cd52ff0357499d9e84dfb05f7348b1f6ca2159e55ada69b8b32c766edf6694ef5fc09ed4c34d8a167ec77295fcd3

  • SSDEEP

    384:W12M4C8/huZNnYnOgnJznEgndenJYnzCnnTvnwnrHnaVv2fQdTYVlXAqC:I74C8/hWzefvHAqC

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1632004b014d3c7943ea52f15af5365b.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a83bba6241a66e9d856c7cc43b8987aa

    SHA1

    03c17adc5dc014774833319a8d345fcc039bc610

    SHA256

    0e6d3632fc0e3e6cfd0fe5846e8df318030f1c25426049d1608e95b4c8cebe60

    SHA512

    f823868f31e69179070c4cd69544bc9573ad9e6d1e1d8b5645c52a51b36d7d38e799c1855525f8958c578a2f8cc637dff1be0c20b7ab55f078a51c4f83b4144b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0938101ed81f409660c4a433e699ba13

    SHA1

    9a93ce79e9db152d3425d7087c2d8795fe1ad315

    SHA256

    ce8458112a4f7a52b3f57b1e63e7e06f40f47ed4cca26d671718bb2c597563e1

    SHA512

    319376746027102a6e45be21254dbef8cb7a057a20a78e238379b8cad3d32f8497710baae9e7315c6c631080b8a11fb81aa8503a293303b083afee56707f24a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7b63e5eb3785a699b69212729822e39e

    SHA1

    5d67035822ca62da4f93f708a58500a8195d9736

    SHA256

    01c5a9118129ee8382627ec189ee6f7ede7ac3e2307cb3bb4ea627bff9009243

    SHA512

    ead59fb8835c31d528b0147fa466896ea4727e0a3aa22d801052dfcd9dd60091bf6daa7ae69afe697e472a7756b1f41a301b2334a3a0a624809fdc97ff9705e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31a69f0540572683664ca6172569be7e

    SHA1

    f9311533b0761bca287a10e7618ad551f54acf93

    SHA256

    3fc915ffe6d282b279d747c431e616796511dd767a3261207eb76a541a9a841b

    SHA512

    3df7928a4c7d971eb55dd3a102dd7285ae1fb6f321ab99efbdf23d131eaebd4f2261a762cc40876f7817ecdfc95d6e786cc456eb543e193e2870868668e23dbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7dc88c8366b75849a36f060742f011ee

    SHA1

    1009fcbefeafeab4cc425546ebc384fe0dc93f2c

    SHA256

    e941aa046d9a01e52ee5b4bbf14f2f9b80314d5e0e0afafb44c5451d5d7b82ef

    SHA512

    8778f09bb8e15e9271ed6b79d7915a4c7ad8eca5b08e51f37fd4b68280d57cfc1dde954924316bd59b151ed1cd8d002ea77214f0376d5fcf23c4a2fb07e5c5c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a43aa8101a14f244c6bf8acf78ae014a

    SHA1

    5b696796fed755c9c3482750f34ea11b83855897

    SHA256

    9d553ac1e376bf224f1b69c2857eeb93acf6f0f08149e18728f1020ee592a60d

    SHA512

    aa40e1fc24a6cbca6f0effbc3381fb2b7efb6c7f45b5aebf7e124eb4ae6a677bdf2f90af6688fbe64fe295cde2095589d6d102a115e91a3c91828626a9c4be67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10026fca461995263640ad677636d8d1

    SHA1

    1b7f80173b4745fc83578b839edaf7f19b3bc891

    SHA256

    71104ed315935b83a0df58c08ff18c420ad3f05c81938ff057cb95c3635ef573

    SHA512

    199e11de7c59741ca6ba1eadcf0dbd1b61bcefadadb8f80d834ad9656731abf7d75c307f3dddbf8b16cf7cfa411f4c1e9aa3b3b3cdf6265df203ea7e1a56d928

  • C:\Users\Admin\AppData\Local\Temp\Cab31EC.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar321E.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06