Analysis

  • max time kernel
    121s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 11:19

General

  • Target

    1a4e05e9e097bd13342c30fc17781a59.html

  • Size

    18KB

  • MD5

    1a4e05e9e097bd13342c30fc17781a59

  • SHA1

    747addc934c16a7d361abbaa74b0da791afccaa8

  • SHA256

    73480347b394468c4dc508299e737e4be1d14e16ace737162204bafbda19ecb4

  • SHA512

    95703ddb4fa0d8281fd9216e06be743b057620b10595d50ef718b8ea9a8c119e041c400d258432f138da3d9177a38ef716d5ef3a21b96504bc779e541abd6882

  • SSDEEP

    384:YDzahsN7ahr1AgdGgs8jMaztTLPAuz68MMv07X:izhxK1AgdGgs8jJO8ts7X

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2124
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1a4e05e9e097bd13342c30fc17781a59.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c10d49e1ea9fe6a1b69ef8608b28fb9b

          SHA1

          3a6aead5eea273494d164fb6ba1022842d16452b

          SHA256

          7cf75d388c9539946cfb9768e2381e9f774779f523520d02fcbc65806f786818

          SHA512

          0c1d9bbea93d00f308ba6abe31e86d1a4531f1ff8205933df407ae4a9de0f46b726962d40bd8b78b46234e3b376edcea1d01fb34416ed2ba77802680d7fbe0e0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d74c39982796f1968f437db767a87e26

          SHA1

          244ec9129a8a6fb28c95bfaf0514ae1d90012e7f

          SHA256

          68c22da015166c65ff5917543e576549826a7875d2feeb12ddcbcb3d8d749cf1

          SHA512

          9d26bcdabd709b8b8f67b7b3a04501673628a21416c1817654c704b0110f1593d846c94ec14042e3ba70d7bb137dd54403c9ccd901947c8e9192ae04b408671b

        • C:\Users\Admin\AppData\Local\Temp\Cab1575.tmp

          Filesize

          1KB

          MD5

          1f1a3b101012e27df35286ed1cf74aa6

          SHA1

          46f36d1c9715589e45558bd53b721e8f7f52a888

          SHA256

          7f0b1fe38c7502bea9c056e7a462ab9f507dd9124f84b1d4666fb7d37cf1b83c

          SHA512

          d6f6787de85049d884bf8906292b0df134287cc548f9f3fadd60d44545652d55c296ed50e72687f776f0bf6b131102b4bf9b33143998cb897f21427fbc8306a3