Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 09:48

General

  • Target

    1526a872720eb0f66714bc6dd173e2fa.html

  • Size

    53KB

  • MD5

    1526a872720eb0f66714bc6dd173e2fa

  • SHA1

    135de21622f4740ac23eb180a8dc7e3449bc574d

  • SHA256

    e2ce0b47e01b5ff77d73145d7bf3d427a4d2cb2d5ec46ecb2d4cb44b036f3fb5

  • SHA512

    3234adf30897a035d4f42c4360c8ede531f07d070defeaa152f0525166df0e9567e61b12411088dd3ddae02fee72bef45708d15facf97ca6559af6c072e47453

  • SSDEEP

    1536:CkgUiIakTqGivi+PyU+runlYZ63Nj+q5VyvR0w2AzTICbbKom/t9M/dNwIUEDmDc:CkgUiIakTqGivi+PyU+runlYZ63Nj+qa

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1526a872720eb0f66714bc6dd173e2fa.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2372

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2c91ca3dd55a527cbf7ef6ac2480e24f

          SHA1

          d647d67f8173f4881f45f63cc8427d034242f342

          SHA256

          4961e6fcdcd641eec5073236e1f09d16494daeeaaa23143c99994d304d18d2eb

          SHA512

          f49aab715d4c353236f45fa4c15aeed1ad25572a0b7df618d0bc95b21a1a354ee4d7b8a543e20b59461c7845d9dd3890000a118c00902074b194bb3017046020

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b2747a310bec667b64cd7ecb7ba2ebbe

          SHA1

          a2de45a682ccf8100392f3b5adaff59025b41f9c

          SHA256

          8a773365b650a5cc717c4fc5a100667f0a9d3932720cd770a3505d838d2daac0

          SHA512

          71700d3aa389ce96766a66fada070dbc259f6ae4a385ae6f3df074529a510f7f8f0771bec3589cbfa4845238450478cfa05adfd007aaaa6415252bf47cea1994

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          779d2849136f412a45b184e1cdab30c3

          SHA1

          614fef6298b0f3540aea7cfae18e6db73c8184e4

          SHA256

          86f87925cef7db1054d230d6a47acd0f7fbb16f7785e1832d3a8a5dea7a35062

          SHA512

          c8ce3dc7c03f8ac2a711b8f73d465ee13a779f3cbb0e0f9ce05a130deb887367ce8b094d3c8e6e1e34db626dccaf4060def66ab25345dea30cdfd46e0bc5e46e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LSNXCBKV\glossar-js[1].htm

          Filesize

          706B

          MD5

          67f3a5933c17b3ab044826d3927d0ba9

          SHA1

          5957076d09bacaa6db8ddc832b4fd87ed8f05f8a

          SHA256

          97e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64

          SHA512

          03ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e

        • C:\Users\Admin\AppData\Local\Temp\CabFEDB.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar516.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06