Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 01:47

General

  • Target

    4a655eb7cca862603442cd6ce0d62a7f.html

  • Size

    14KB

  • MD5

    4a655eb7cca862603442cd6ce0d62a7f

  • SHA1

    6d24a7b8f2a572cc11feb7e88710f04fe1064c46

  • SHA256

    e4cecc21bbad1ea0c96811276a05d4e97db164e5a419cdf6e3fbc2273f6d12d1

  • SHA512

    4cab9b0509a92e47c2903c87a98768048cee6e010a4e3a21886947e08f0ff69fcbebc569b943f95b8f7b32dd2f163d0758e2fa6cb776ee4f4c83a4a467558b2f

  • SSDEEP

    384:0aR0ocNsukctd/MRE+kjYNfKT985WLDobjpQBhKDCcy/ZJJ8G2V:0aR0oQpkctdE2+kjYFKTemE3pQBhiCcz

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a655eb7cca862603442cd6ce0d62a7f.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2284

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f8e99a188d8ffec4e8a1482d1beed9c2

          SHA1

          c463c7dbda4eb05a4aa904d2007275cd4fde7135

          SHA256

          ce99615927de0948a2ca48c2527c6030ade02ae3db3b716b7960ed8adca543ed

          SHA512

          57735dbbae147a5de0da390cc4ecdd8225b7d9505039da9b327780d94d3f3755292d70781c1eeb6ba2e5355519d7ba21533a517408733ad00f0aa6552f557587

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          129651fa9da68c08b19d2c37737e5ae2

          SHA1

          ad002a8609ac3d2c0ab059451e194bea858c4bf9

          SHA256

          2600213cf3c8bf4d4851a217faca47d6d66d6150e1894c7ba5f31e5f44b7e0d7

          SHA512

          dc55e3774879be32418e9ba468394835763b539336ed8155b870e92233b67cf1b744e58d85ea253bd0accb8be1f17a1778e30897ee583a7810d303c209de3152

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          cc6439df360f66e56f1d1849a7a78806

          SHA1

          f0e8e461461f9cf6aefc6de89a3531e62306223c

          SHA256

          7868c1d1a04e4a387572344284696183125535de0b2344463a8b30fe9cedfb87

          SHA512

          f869c1bf17c091c1735f710cea66de6cf4815e3761731261624d55db0e924c9ee849a33e44fc516c9273cf38a033ad0d663075b3a53184f49bd9734a06a1cef0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          be46a87b0a3ccbb32b7f20256cbfda9f

          SHA1

          1dacd73057064c90cdecd557c1fbc3d0cef1b6fd

          SHA256

          6ae89044760274191bd4e5808b668066b1d5f6b9f61df95dd617931ea628974d

          SHA512

          00aac998767c647e471bef42f25721ae5e5742c6fb61d1bec77ac8a9aeb6fe6f15028f51976446c2a66d9bd437e13753da07d2ad4ce4c6867959a9b0f578496f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          1907cbd7cb2e3e1c5d817b64faa8f379

          SHA1

          4510a871509334c0f70455000d9b5b9ee5487cc1

          SHA256

          1eed59302d624bed5cd4ca045ec45fd2fa7099c7e9c89f560cf7d5b2d83bc653

          SHA512

          a65095135acb6392c31bb73f004720c1a6f34c3a57b99b07e28411caee5822ed929b3df6bfce355b0a996ab77a9aa83653594e21f01a0312565d8fd1e62f8173

        • C:\Users\Admin\AppData\Local\Temp\CabC542.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\TarC660.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06