Analysis

  • max time kernel
    121s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 00:29

General

  • Target

    467a7b531dc949a57df03c9d047373ae.html

  • Size

    12KB

  • MD5

    467a7b531dc949a57df03c9d047373ae

  • SHA1

    a18231d39535768eeca2ddf9bc61cbeb1ffac7cb

  • SHA256

    dd815f0478a96bc2b0549396a840f4f77830980fab02a12933fd6295cf70dc8d

  • SHA512

    b93816f69416292bcf09d1896f54d4e27300e0ea0d636114809e356bebe1d01a51a0d9e69eea2f6878880dfd699d3a18e834af2ede343580b7ab655613d1ef57

  • SSDEEP

    384:swlIcXveVWj6p/gu0BLZrnZk6hu0e6guLZ:YgnR06xLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\467a7b531dc949a57df03c9d047373ae.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1708

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          08d06f370a37f679fd4a2a25722258af

          SHA1

          ec67f1700548834fcbd73da15c6f928416750487

          SHA256

          c7812fed0c3c7a6fb301b89cfdf85f2286778fb8fe4d116cb06b395646e491a3

          SHA512

          4e2ec4d119d5a3b88cbccc9a936dda073a3182500f1dcfaa202ffd1a3576b95ef4bff7dd63f0dbf40b9ec98e81cc31c5826c9c1e8b938b7b52aeaad7f02defda

        • C:\Users\Admin\AppData\Local\Temp\Cab17E5.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar18A4.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06