Analysis

  • max time kernel
    156s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 21:23

General

  • Target

    3d4d569748e418af8fd547a4f2035216.html

  • Size

    2KB

  • MD5

    3d4d569748e418af8fd547a4f2035216

  • SHA1

    a05e51097dfa568b2c46db69e0781eb8d3393800

  • SHA256

    2bc92e69fff482ff18fb1fb1e432a5bc10ce71c7a0f283719beaf6cd576fc241

  • SHA512

    7a25fec73d88c7d5d9e61729bb68104ef4a939c34c3dc23e53513d1df80350c46c21ce68ce002323d7a410b0d713768f0740116a5f81597b49d5e952b023f2c7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d4d569748e418af8fd547a4f2035216.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    880154f2880a543f880810b193b1356d

    SHA1

    149fe272b37e09d9871c755fd78a8ada0e1485df

    SHA256

    fe99f9b3566c96606ac4681639d4f08673ec3621de6ac77bd1656f123c5a3673

    SHA512

    28b24a0e28660fd2bc1ee7099404c68dfe71898c52fa83365268edadfa94b7648927b0e34ffa65aa05a75fbfabcbca3b8f796470c1354864ac3af92d8a92588a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3857ef7cf2d03687b919da93a2ee512e

    SHA1

    a1b8a71671de7630c1a4540262a861000019ce88

    SHA256

    78d65e12ce40c6ec2262fef9f528d69aec80c7998c6f44b2a89db19a715fbee2

    SHA512

    50b92692e0b74f259b92bcf5f2672d8b670c09c366394d70e40f86b6559ee67987d78a39f20c2c3508e9aa4666c3d6598c32325cb5fbc0de02ef1480b3330e1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f4d75788e80979f24fad519aa9f800b5

    SHA1

    5bfea239e3341b9906779fc0c1d2cb462a3ead71

    SHA256

    0440209caa05246286a03a3054e7e62ea1828041da31bcc07ce583e6fc774213

    SHA512

    328ffa7d4a0e859c23be8eada583c028cf951d6757949a36b55c3ba38aca216df6c597d8e86b277239478c16e581470c202177c20b99e8d767ff92228317f8ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb5740d0191f113ae6598562f2e0141f

    SHA1

    f6f0289bfd2e69348b37a0d53dd85a19fbd5b3cf

    SHA256

    44d10feb179cb9166180dd8f8a162d7ac5bfc7658f2d493450787e22cdfdc910

    SHA512

    8a82f7613bc6249bcc69bf186c583a8eb16c6e09c075b6f7758db07e363220ae8ce3e0337e4c0c7793f13d12c2c8ea697e52c4906742a5802a9da72104e9d18b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a9b9411d145888a7a6fad57ce203af73

    SHA1

    303ce7563485b876f59d46e71a3c14ac18ee71aa

    SHA256

    fe154a79d8ac6c05d0007333cfa2bcdcfff56cf65b9f5b9b3189ec6f399891be

    SHA512

    fbe5fd640b85918cecc05445fe22cfbcc5ab9ee9f9a6740e9f09660aed884477e74fe3c06d241580bd2ec7ff990f99ff4308e1d84bb0bd681beb58fc94a8788c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fc56dbc596b08001f2db286ce1236749

    SHA1

    ca0ff7ceb6c3391c975c8d78d5d41aaa22ebc137

    SHA256

    7050b21f82c989d30750d35cc5bf7cf71d2a8a80331f671a1e7cbd6149e42922

    SHA512

    3d57cabfda23b0d9d7941efc99af3c506c9f08abfc8367ce0687e2e1c5cc2fb9872511457ae6e3ba85ec1e04239d7455ae4abe15c85e533ae33c910d9688e600

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6cd84f1d9a4c74df0078fdcfa50a59ef

    SHA1

    899c89f9ba40026a2de75708792d474165f48316

    SHA256

    9146bb0187ec7d6d8f0ec0f4c8cb066c0983e1ad0544f7112c562585313c24f7

    SHA512

    15ff062ef2ed8092defaabf9e192763f560e96d2060cbf6e087026ed71344c9f190a11c910874821074b6af688cd9014d35a50f3a88058c83e388ec8bcd7c541

  • C:\Users\Admin\AppData\Local\Temp\CabCE87.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarCF27.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06