Analysis

  • max time kernel
    122s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 15:09

General

  • Target

    2824fe9f37563f389394fd514e0ae146.html

  • Size

    14KB

  • MD5

    2824fe9f37563f389394fd514e0ae146

  • SHA1

    eeb392e2b4a92dbf952f4bc7fc1128f945ae8fd4

  • SHA256

    13be8831deccf9a02c7bdac7386310a4a17f61d736b60feee03823b5cd878002

  • SHA512

    70a1079aa47a27b9267bd729ec63b43e0812146d1db33e1caacf56b385b384f16b2f97392d55dd560368fde3e3bccb5adf64980cf8774123d8f3051a1b43301b

  • SSDEEP

    384:Y5N1RxemqtEyLu3ltKtmd5b7g2d5bigUVQ0c:YDle+UubImd5b7Bd5big6c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2824fe9f37563f389394fd514e0ae146.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2348

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3999fd1aabd9b4d7892c4398577e908e

          SHA1

          3fa92043fc4a44b26ed907b793f39e4ffd8bb108

          SHA256

          76b3d825217d83e3ce244e745aade670cd8e6334254b20b06ee3c1b3db594c81

          SHA512

          5847a68bb4316a4a140c6a32da91656f9819737ed38ed002cac09998f70a78704d870954d3d71805ed192a639d73ed4b2d3a1f3035ca1a7289bbde3a1b532647

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d10e5a6f9268f61b1bdbc61370fef668

          SHA1

          68dd3af723c291aa5666bd8792128e268c824f78

          SHA256

          5ad68f27e69c6ee4bb2c03da9424c764f95f25a7d7e5e33a7078b8bbc79c4ef8

          SHA512

          e9f071c8b6d7aae3a3f8efdd9a4c4ffc7396620e7c138fe05862a26ac3528b47e49afa786335904286568cb2a9b074c5b6ad3229150af3f4456240dd6b5aca2c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a47ee2e51b90907efed5303bdeee8f76

          SHA1

          e1115343e179d82f19e84dbcf53c81f21de5d682

          SHA256

          14daed7567a9cd977ed5084db975371cba875c3f39bd24f9336dfb6879de70a2

          SHA512

          e5d5c17724ee23b606599598eb401e5d9f895f158d6cb5abbc65c5a86f79dfc1bf53a03274a90bbbd47dbc5763e45e0f4f7dacc37ab7e579b60b5578f385cb34

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          94a288c0566c98890bed0e67086c2b35

          SHA1

          0e0d5dda6aea5757784296001d3875b3a18d7d66

          SHA256

          902b2cefba16abef14c3afa386e5eb20f4d9345559e34d944b907ae4446987df

          SHA512

          27885c3ecc188881f9604292c05f65017c4d8b3662a89d1fdf14398583d3491d78c02afafa25702cc642b8bbd8ba753e0a83cb57b364bd402a82dcafcbfe9d3b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5926e7e8465018c44b845375ab3a00c7

          SHA1

          20d8eb1a263824ae9087ba50c2220f0bed14e0ec

          SHA256

          c8f3a07f998a0c3baf5b34e18bda60a6025098a602655441dc18962d382550bc

          SHA512

          a1f619960a1ab9396d5024e51b9e972612cd2f6d401ab3453d2c9b8aa9fcf2b9e23a90a5e100edb1540a3b002211ee543131264caa6ba078d17fc3b00929a000

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c8617a055c2f040c98f8e29a170fc771

          SHA1

          f0c4f26502ca18dc5b5b61589c6acbec68793b13

          SHA256

          b640379faa4f4d6448771bdcbad72192ac830ac5a301ec56344348cb2dc5a6a7

          SHA512

          f8be896b24ec896bb027478dbb49158e18e4de891c6aebafaa25176f13ee3dde3c1bb14e5abbab28e68b1850be49d38d1a2a0b440bf621ec0747b371e90ba191

        • C:\Users\Admin\AppData\Local\Temp\Cab31F.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar342.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06