Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 12:51

General

  • Target

    1fe17fc072211748f5aac449830ccdbb.html

  • Size

    12KB

  • MD5

    1fe17fc072211748f5aac449830ccdbb

  • SHA1

    ef63b0d87d3b33ff24fe673521e0ea832f7a4c8b

  • SHA256

    3544d9d1e13e85307304ceb12c475ac404663868a8d31553295f3f5e81d15586

  • SHA512

    f73ede4b3f34425ea532ac1458e888c1deaf4e2498149c416ca04edc2e59d40d6a9be03a8951a4eab909248bc60f4d20bc085b61d99359037de03fbced7b6c41

  • SSDEEP

    384:Ss2ZquTqEjld6rTyv6Rb+nQKrlibQmYMH/pMF1E:SvbgyvCAdhi8yfpe1E

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1fe17fc072211748f5aac449830ccdbb.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    107b7d1d841b46e0179c4f0ca9298e40

    SHA1

    90effc94535a4b0ed7ef45b776c3bfcfde584b5a

    SHA256

    023c63a751e7f94ec0ee083c21874f76b58b39ba3ddcb294335273853d7a9bb8

    SHA512

    5af2657af6d7c2a8a8606a0de3c7e22ed164eb749a0ce5980b031e67359e0f365af7b938cd26f982216583be71cb84d97a5fb077af331ecb19a4750efc22191c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fccea257294af1380f58d6c76fd9f341

    SHA1

    9de7f60f3b421bef54bc0cbb053f18894aae00f0

    SHA256

    bea693e9039f278e4db07234003a47dac48d5d5cf6b237779a6172b33e7267d3

    SHA512

    459a9327473cf22b8bc9fb0f90494dd15adbba229b12d8425567a20b61f6a735b6693182f7cef0dfd281023b09842cca5a75ca81cdcd41820a74aaba186ecc5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a17ac9c6afba66144563c9d48162b411

    SHA1

    ddaf93c7fb89b318dd0978eb36b0354f164f4a29

    SHA256

    d88eb19d160be4db9e67ecddee4a7339ea894f57e001d4b55256f5073bd6bc72

    SHA512

    2c1dc10be691b79c26e0ce48ed4847d5b26fe9e89241ccfcf3f44865caa7eca910cdca8c7a621297c2447e52bcaa75ec9fab68b5e1ecc74d3de4c5b5cb772496

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    ed1f7cce6da7ad7692be8930fe78e14c

    SHA1

    fa06ed043c2544e52f54b8b119b6606c8cfae45c

    SHA256

    324bd3615aa776a843ce0074ec785cf9335bf0abb3df0a021f95726f790f0e6e

    SHA512

    120aaa13c644f07667431c3405be71a1fc357a9274a0e73e859bb96b429a1401dcd662d6564ec747a85337121634c9c4681fa0a484f5ac14662e32b58d33355f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    11384baa021e56a95a784aff8fba2bf7

    SHA1

    98450d01f27a26a98928e6c925befcfc2f7c2644

    SHA256

    550bb15f818e937698c78669efadd66fed840c8f5d296416e91b70044782f179

    SHA512

    488909bc339217183281b00c405666b646ff67935a6e65985211230bbcf4b951a1123a3e3253920deeaa132105476ea3f99d22ec342ba94a2f3e46704fd09b46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Temp\Tar23EB.tmp

    Filesize

    14KB

    MD5

    bea684140fd6d14d2a857e84a1ee3217

    SHA1

    041532fe7563dd3afd750bf24aba537390f3b11e

    SHA256

    ef10b6496f41748be1291b2ae493282632fa3e20fad19e9be8e3f087ac6d5944

    SHA512

    4e021482517e0c0160ab95f4777f06ff478b1724b9f7e414044c02e8176f0bf66c80eb24199c8d44661dffe6b7173c8769bec1f0711289bb33e9daed47ce58ea