Analysis

  • max time kernel
    119s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 11:18

General

  • Target

    1a4081f7056364c84d42e09fa67d823b.html

  • Size

    7KB

  • MD5

    1a4081f7056364c84d42e09fa67d823b

  • SHA1

    b39e54657f48b42fc06fad904781d2082d0aab66

  • SHA256

    e5f252d87577a37f5a9b020b111a63b8bfb4774b03edf50b2c1497c64e41d0a0

  • SHA512

    40e8e0d5b29313c6aa00e7a2de11f0115aa313a7e6316f0c5fc8475363e4f743ac2b428d1b59058699e98f12c8bbaa0cc127a67714406d8d135fe5cc52a25920

  • SSDEEP

    96:uzVs+ux7/zLLY1k9o84d12ef7CSTU3zf+Ch92UccEZ7ru7f:csz7/zAYS/Njb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1a4081f7056364c84d42e09fa67d823b.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    042875c22d41e85ed0f89af7242374a2

    SHA1

    885549713c8ff8e36d374f6ee7caec4f69284b82

    SHA256

    595551910bf208b25544fd4c5e7214026a3283fda60e32dcb80bf6de906c8efb

    SHA512

    046cedd4bb18cf21f04cc12411c10eba014e54b288c608f40fe75bbb7b0f7acfae536e0c3b8ea6eba75c27d87063c6bba48798fa0c1f613b973678d0ed7ca223

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c181c1595ca85fb6a1b5ecc833509bf5

    SHA1

    b7d7031e153374e1a2d4a9bad204645514276021

    SHA256

    19f08d64d9981c6bb50214d75d15dc5ee71075e59c986b209ce2571a585239ea

    SHA512

    d5c6d8da4a31d312a346cd6b0a3f98be31ac9a698f7a773762d0beea1dd6347e0f1b470a7701bad73895c370469cc0299219a87a1fe7eb92d253d65590044aea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2380267d4dcdbe1670e1118491a4e414

    SHA1

    2b410c2ba082ad6703cc289c9cb382473d368787

    SHA256

    cdaf2c4e4d5805873002283d18bab10d5b54a792a4a461f49d09db643e36b75e

    SHA512

    006dc7dc6bba6c39b02c8c7ae7e6da636c6743437329d3bcc6e6ac2bfba50f2c7090d2ba6e80da738ea343979b0f84ec9ad31c926dd7b473001fe64e9a0c4884

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b41d9780110a21add0b7f9936cb7a7df

    SHA1

    969c64da950431134b436b38cfaef7dfdb18e9cb

    SHA256

    b1c3091b6aa4f6080a7ebaf7bed6a3756721e3751fe15a10cbba112edde62b50

    SHA512

    7fa8bc4b5ad481dbc74243a21c2d1ea35450b37b811f3a4fca4a254735e99b1a518fc916b1aae792dae6bd5c795668a08024f1aaa8e52585b291b1fb25ea4b7e