Analysis

  • max time kernel
    137s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 18:36

General

  • Target

    34fe36c453b0c5bc1d2d2cfb0977ebe0.html

  • Size

    110KB

  • MD5

    34fe36c453b0c5bc1d2d2cfb0977ebe0

  • SHA1

    0b17639c7bf4f78851f033810d375d30bf8b9d43

  • SHA256

    4e83013b8599207cd7fedd10a604e04daa5fd4df7500991dcfba1c5c15d5ea0d

  • SHA512

    01c8cb7ef3b3b3431846b7a5639bac4d457de0e45b990c365b1a488c2fd9a8462fa9b619e8f9e8aa5721d028d854103480a1b60135c9604f88744485f2087bc9

  • SSDEEP

    1536:nyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQSz:nyfkMY+BES09JXAnyrZalI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34fe36c453b0c5bc1d2d2cfb0977ebe0.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    270a9652a26393c59d28149194e34d15

    SHA1

    ce8cb93e777d2123f726d9cd59033c9e0620e90f

    SHA256

    d30f0ca9310cff13ba1fe833d4b1db2a4c712fc556902eebf2a4cc4af093cb20

    SHA512

    8ca08151543c8716db665d59a482b8edadfd4b9b917e3acc1f9888255870b90c212fb9e5e241b52553961de659533eacc87b6f5e3ecaf0ea4e473b575027ea17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e8ecf0efa978420a9b7cf8de65974af6

    SHA1

    7e21066ebe0558b715a83201fb160362e86dcb6d

    SHA256

    ef320d61055687a7d28798bac45e993e4cdeca9816f09ede4396ec7d15de212b

    SHA512

    712f5ec61d14d02c25c8f8eda24419ec6c673265a2d98a06151feccaf264e114fc601cbf4c354696a075470d6e8837efea7c9f83a406c75598842ef4ae86ea89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fd056e71d5d4e53d231284f8a4bf3734

    SHA1

    14c8968a3622456d5c04c4f004cb4cc144fdfecb

    SHA256

    b6859b577779340b9c4cc6ad49f9c91266bbfa41a7bb13529ba90dd062ed9c13

    SHA512

    d14e7a5662016e6e9c79a75ba00c96ce671a3c94632bd613e15f41c4dd07e0213bee663eaf43124219696107d7ca2d0004b87741c7d5347ed217f5d2149eec99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3fdcfb4b4feed318f64240bfea016ca4

    SHA1

    19c87489b565e7caedf8ba3534299a2d09f1a375

    SHA256

    b5f12ad6bd4884038050db4c7e9e583444e3691441cb0efe9fcb84d9dca93c77

    SHA512

    1e012442b1a7ec162e182fb6fedacdbe136eb2f1941269c7d1435f200720738846938652373cdd30738ab975311252d88ea2f79189263fbe43e6d7bf593799fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3fc6df1045cc4bac4325314588917149

    SHA1

    9c4833b2e9887d2cf6379e070ff16afa3ab0087f

    SHA256

    a5ba9b95524a0def6ad90554c18f752973dd9f50611256fc7b40fe206c8e5c00

    SHA512

    060d2ed27475919ba0e55c90353ff027c0a66d0045a6d7fc05626b501c0bb242c4cbb07a979cc35a1f2697098550fb034eacac92956ef269365040523e954230