Analysis

  • max time kernel
    118s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 00:24

General

  • Target

    4633fb742da414e8a7c269dd52729772.html

  • Size

    20KB

  • MD5

    4633fb742da414e8a7c269dd52729772

  • SHA1

    9474c699126ebbf73afe109490b6c15cde56dabb

  • SHA256

    dbc9862154424130e0887feae9d417daa1e1fdb349ad7598eca5cfa15cf081e2

  • SHA512

    7fbdbb85f290907b9c2a9675b18bc90e501f212babc33327b93690372857ab07e0a12bd376e1a405f45952af00e4d42164bcf659b0c9c222e80c079bd617c79e

  • SSDEEP

    384:4+QfPFd9QZBC7mOdMWaMyVZuKfpC5IgSnbmFe7AcX28AEvBc60Vqjq/hHe7Pd:Zcd9QZBC7mOdM44pC5I9nC4qKPd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1632
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4633fb742da414e8a7c269dd52729772.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1748

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          be6d056a858ab2c96c2d86fdfa276ac0

          SHA1

          9e54e968ba4038e92c81df5c74760c8d22ddec3e

          SHA256

          7ef1fd314f80722cf45f121c4ababd1eccca0c2d4194532b665f0874a72ddcb3

          SHA512

          21a07c1cf583f42ee540aa07e079adbf25a63db0fa8e017d6f5600ee5100133cd4d00a9c68f39f8fc1548ee7c9ce84afe90a911b1c12e39babb78cab8ba90160

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c7e3d0e484aeb5f7c254d18311567379

          SHA1

          4a4989ff712860e76b841f7b8cbc4cddf8f3b75f

          SHA256

          92eebe349b719d7df14aec06a145b6fcbbc1acfa7cd50570bb2a1d26379370a2

          SHA512

          c47ab739ac394b3a980c92a14f72f72679a932964a5c96e1c1b5f7514612148a29e1714f3e28a5d873146cc960a2506b52f958b6ff0ebebe8db54c6ce606a81e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          59b9a1511c32d525c667e161f0ded9a2

          SHA1

          f2d7689204a1ad6db8d37710b85b3137764351c0

          SHA256

          b813463bbab9711de5dc627ae7da392e3eee4af1a222d9a3258d19524d3a89c5

          SHA512

          39a7c21d9e42e3cad3ea9f457c2ed24bd930902bdc25f24ccb4e216f088d8a765da921bf62f75d182dcc08a185860155df1890475db1c50345a9551343aaa4ca

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          569577dc20fd47ae375a9de3cc39e05c

          SHA1

          05900ddbbd4ee9700d17843f5b02ee8b0f997f04

          SHA256

          e8815bfcb08f397fa0347fe5100ba8fac426e48f639d1dac2ea34ab6a9aa389f

          SHA512

          3b43737785cd67a637d44af9d5e92b26227cf0f4f28e5acd4f6af49f2e7c03130684079850786937990e6f7606c1dabce18ed9f89b91709654b77c7e6fa49ca4