Analysis

  • max time kernel
    117s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 11:00

General

  • Target

    191e45eed9194c588c8de59b40c658f9.html

  • Size

    9KB

  • MD5

    191e45eed9194c588c8de59b40c658f9

  • SHA1

    a58c0b9c5246ab0a5e06fed109fa2df38e124b4e

  • SHA256

    dcda27af1a91a60668b465e7a24cce974b01cf37cac04b129f4f8339048dd7ff

  • SHA512

    4f7f811d8176dc744af60f37accebeb931020c4ced74fff943bdce63e520b4318d099dfb6c46bdffb01262fef2d6ed4a3cd2dbfdf91388e99f9329956d3d5688

  • SSDEEP

    96:uzVs+ux7SOLLY1k9o84d12ef7CSTU1GT/kPsipUlVHcEZ7ru7f:csz7SOAYS/cdUPHb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\191e45eed9194c588c8de59b40c658f9.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:944 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    c1f9a5ad1a41ab35740f8843ef2ffbc5

    SHA1

    18ac0164ec67b382158893f64a10ab41990ef28c

    SHA256

    bad6741474e98b38bfe9091685e319f62eb85162d99499b6d3c4f237d6e3e3ed

    SHA512

    b179886be7412db392d23476b78855f6875c4f908beaede4b35487746a4113bceef0d935676d1e1c144d60afdd6942499ca15aac5bc58ca440d1ba8b308af628

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2ed00d3c75b4a53ae101b7712d068983

    SHA1

    bb95b68435de2d771cb355c4f11ae7fbdca5d12f

    SHA256

    c07d111056218285098492f8d116b8b84cc18b9fe43ce67d8d048ed81265c4a6

    SHA512

    ebc87daa93894cdf5a477c8056a6cffd1bf5786c4e05af63cb2bbf513899a689169791f5aeba3176ac183d839f280af007a91a3707e6c55f32e71f818e40cde9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    88cbc2a25a1bb47460e3563823e5fd97

    SHA1

    abd6435e9507ae0f71581286880aadee7d12508d

    SHA256

    281ce89b47ba3d4866cc53020b186a0671e989206e91ccc03d25556a695efb9e

    SHA512

    7fdf8e9baba3c35f907632bb5075096cf97b0b4fb0638a45611f9d075570e76dc3360241a8f7e7217c8e1ab6a4095628ea7e8014b1c8880656bc8626489674e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6ecf9dbe5aafaa46e56879012dd38149

    SHA1

    21ee8c87b6350407237c08f74a660ca83638756c

    SHA256

    da948b3cc46864cad1635b41dcf25e35c83d977121c1cb8738568caa987bb08e

    SHA512

    e9a289c41e9b2b55ed76f44b06373ee6fd3d311e05ac45f8b67f7e21fa2e582387a96d774bf02bb9d43becb977af6c1df8363c7b245069a0fd807cc861f5c400

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Temp\Cab319C.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar3430.tmp

    Filesize

    92KB

    MD5

    71e4ce8b3a1b89f335a6936bbdafce4c

    SHA1

    6e0d450eb5f316a9924b3e58445b26bfb727001e

    SHA256

    a5edfae1527d0c8d9fe5e7a2c5c21b671e61f9981f3bcf9e8cc9f9bb9f3b44c5

    SHA512

    b80af88699330e1ff01e409daabdedeef350fe7d192724dfa8622afa71e132076144175f6e097f8136f1bba44c7cb30cfdd0414dbe4e0a4712b3bad7b70aeff7