Analysis

  • max time kernel
    0s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 15:30

General

  • Target

    298374525a77f86ff178af3cbfb81cb8.html

  • Size

    1KB

  • MD5

    298374525a77f86ff178af3cbfb81cb8

  • SHA1

    1a01fa5ce1180a285710ea2c9c8ff536f208cac0

  • SHA256

    0516ed8e6e03daf1511e6335902546166c3fbd7c45a301663b0a268cd7b49556

  • SHA512

    58811642a9f7352b5c654bc3a12e888228d1e595e5be7f7cb156ec394c250c3ffc119b7420214f7fbac551d0845ae7a54bcc686f01f300335debea27985468fc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\298374525a77f86ff178af3cbfb81cb8.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:2
      2⤵
        PID:1920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      21KB

      MD5

      39e0c0fc89a2c3afeee2daac8499ec90

      SHA1

      6fa7e24001b6aaadf11352908cbeee4882e36110

      SHA256

      4b51098985d26446fc1f38e5d5a2e1405db4c1cce90cf8ab61dd3b978072bf59

      SHA512

      d6aa686efcf814a1c173ab16218016773acfa95a6bfac53661fb09a7dd2faf847f520fa11dab002a8cb52f4a0417437cb244fc5767430f0fdd45a7a33e18916e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      4fdba7fc92d1436f5b03ce33e2e3a6e9

      SHA1

      3eefbee3242addfef3e8804b092d73f1121ac3d2

      SHA256

      2af53ee464e3b1a0dfb83e65c6763a7066a90569cd8040cf2780f0bb18c672e7

      SHA512

      35d7d7e3d6d8a73e9c761804223b88a3446a7ba9660e3b996cbd06064265fe51bb38192e1db892fa7a778cf26c6565426f55638b1363d7981cdf37e995268f75

    • C:\Users\Admin\AppData\Local\Temp\Tar4724.tmp

      Filesize

      92KB

      MD5

      71e4ce8b3a1b89f335a6936bbdafce4c

      SHA1

      6e0d450eb5f316a9924b3e58445b26bfb727001e

      SHA256

      a5edfae1527d0c8d9fe5e7a2c5c21b671e61f9981f3bcf9e8cc9f9bb9f3b44c5

      SHA512

      b80af88699330e1ff01e409daabdedeef350fe7d192724dfa8622afa71e132076144175f6e097f8136f1bba44c7cb30cfdd0414dbe4e0a4712b3bad7b70aeff7