Analysis

  • max time kernel
    122s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 09:30

General

  • Target

    14829f236fb7faa3ac0072d54225ea9a.html

  • Size

    1KB

  • MD5

    14829f236fb7faa3ac0072d54225ea9a

  • SHA1

    3a239c19b5e6af62c942ecd614b7ea28554931a3

  • SHA256

    6562e16b1f2bb0e1ddfa549e7fe353249130f06e2f3a45b8ca7a0f683cf163b9

  • SHA512

    4365e689f8430d5b804e352363c809ccb52d02db440d48f37fe2edd71cf1f9e9b0f1cadc719adaed88da8df1ede50f63b9ca6e36124f1ac886102f36b8d99d68

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14829f236fb7faa3ac0072d54225ea9a.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3056

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          029189d8eec707cdd93e4b0610b1807c

          SHA1

          e0c590c16d19b2d853b479654acd082ed040a6ed

          SHA256

          ed19a0f1f9526ee0a3ec82d391a11c592ba6002f782be9bf1c030bf84f781c00

          SHA512

          ef0b2a1ced781d0d088b6f8e94f40dcf18f63fa6fca36661e0d26c87323581b4df808a6e8255a4da76c19c8421b1be332b0efc63caf122a6de43cd524ac4aeec

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5858058b8d70d113ba214b273cc31e39

          SHA1

          36fef17cf4f80736d6e409e5fa5d5ed453ca4921

          SHA256

          71c895347d675580590604a65c68da8dd90f48f26e716a87003b5eb104a4b3c0

          SHA512

          dc78612555fbb3141e80a64bb316623f79313e7279d36bdf7e953bc46e9c24fd6c274cd8cc84e0a8f71213ff584c57f6d398fc9989db436bf2dc65c3a715f152

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          501fa3e9afb5e176feaf141cc970b45b

          SHA1

          74fd05aa54e4af891f4d45fb966a3c4436e2a3c5

          SHA256

          d0a435ffe1ba770fa2a3331e04dd0c547461d0682163d89c28bfc0104d0cef2f

          SHA512

          41224c5231e57c5529ea6cbcdadf14c8f6a77de2240aae1e96fddc56cecf6b0df694a9a01eca13d64fee997d9c2dc718c62bab0099f23db79b7ec1b885110a1c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d440e9dfce7e205e4b7716cb8400abd4

          SHA1

          c0925fd87f4684b34d9db91f0fbc4a14deb896ad

          SHA256

          9e941f24da0d115f4abf25949d3a9a066276a3bf3e8b6ea6411a1935418de949

          SHA512

          e8fb2aac72aa454e88ac95714e9988bbcdc1e4a3bce0f15c4a36cdeb94284fd9c4a4767b773ecbb44c62bc87413c4db50ac24317d1d7cab705a0e7a303b938af

        • C:\Users\Admin\AppData\Local\Temp\Cab9753.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar9794.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06