Analysis

  • max time kernel
    15s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 02:42

General

  • Target

    4d71c70c3d81c5fe99737dda1072b39c.html

  • Size

    100KB

  • MD5

    4d71c70c3d81c5fe99737dda1072b39c

  • SHA1

    589d04abc5118ccc59e416cda170453c7a750eda

  • SHA256

    e66684ce861b7a5aaf57c975a2526be8b197d61bff7ee29ebeaf673458912b1c

  • SHA512

    705c12d7eb3ee327bab939edd54e324f9f1f978642b999cc13ccac975d017fd6e8b4fd03bac969a5fef3b74e81a1090ed861f9c57169e5c48038356b0140b3db

  • SSDEEP

    768:kkobmmap6D4LMZxusSbtAQpvQzOQBg5c3XzSFZ4+/5GjLmXFhUtm0DCTcb42ReA9:XjOLmXFh6eAMkx3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d71c70c3d81c5fe99737dda1072b39c.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    75f03793c617bae6c326d755f157f667

    SHA1

    9e81ada37abad8fd3c681441221cd96ae7f3aa90

    SHA256

    0f2a88cac3d71a2ad809d46211240564123e1eb073b6efaa3548ee1e52da790d

    SHA512

    9d970ffd5e622fac8a32915d5b649b2724d6fe04197c1db5e04baac6c071472fcb236656539f6be9f6ef07bc29917e90bd676c41b9f348337cfc701181935720

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    85160ec6ca9e0ba74a31f638e305b3d1

    SHA1

    acce22c4b5157576e5bb45d6a79404f660290dfb

    SHA256

    c6540d5e664a89c9e0e8ba53469c4e0aa4cac4c681a1b56cf01391e02420dbeb

    SHA512

    b8d27d2655391c183068f0d9c0d239e501ed3af958bbad314770e3e19acd77191eee97140bfb3c48934fc1ce0a2785ade073297d2a7b6dc4cd1b609d7a67cc43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    61661ed7c529b67eb0670f13553d0f35

    SHA1

    389a6c2f925d0ebebb47411efd9239c1a5734d1a

    SHA256

    4932e1c4bfb5ff72937cd5635c5b813306fe5924523d0c13596a308989697745

    SHA512

    56d92a8b9d20b3f06ef0fb060edd9f88f2d8310eaa67899e8e75d11850498ca088c2f84ad542a7dedf403c4b8b217145489e99b5a7f5b6766066fc12e7d0cb3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d2a1bf6ef3888a3b938e9489b0ab712c

    SHA1

    fb251cd0076e0e62c2cf539a544ecb1cead2e8dc

    SHA256

    cbc40186a9449a69209ddf192d43cb44afd00811074a60682f5308d506dc13bd

    SHA512

    1d2cb2e14616cfd9d90a72a25335e57c0489c61deb9311fadac077dd5c36aa60078909f9e051e7d9eb5da496f679c623bf140fa6d96dab0a078654c1f1cb8415

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f9535bbe6d6b64dd19592db22235327

    SHA1

    b9afbad750d3c92af4c7151e42c733ae4efbe06d

    SHA256

    21fa7197b1f4b4932021fe6e20bc7968bf8289c264028b8c6133ff3371c983dc

    SHA512

    17c03e2893017eb9ea232468af2549b542ea188607cc37a0e7c4b46fb9511bc51e60146130c889da3ed9cdb378d0d1bf8bda69e5bcb5f2a5299197c4d401de24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    688094ef67236b26e63547e74d48ced3

    SHA1

    b152e9427492ecf3bf44368e86ccef4d8cbb38ca

    SHA256

    953f8067336cb68778c58940a6ae547d72e2b3983ecff635852b9fd6df7d7271

    SHA512

    cd273db36c69dd165f59900a40f33775ced3bdf665d731340ac389fd03476286896cf63583a87d25f36abcbd5f9af6e079877ba9c6edfcaa33a5af863f670dbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d2d65e133d16f43de550f3b7f933b32d

    SHA1

    994196b2ac19a18ed7f290b9cb3967461ff5479c

    SHA256

    00e5f6bb84d69b2512e078f973e24595781ac63d151e00ed30916acdbf8efcc2

    SHA512

    401509a57b903cf4b03aae99d6f78e72e42634fd2c88757f03b8240ad5b36fc9bf4189df3095440fd8c8e26a22254889aeb835de2202359cd7e1a671bf671b59

  • C:\Users\Admin\AppData\Local\Temp\Tar4BC6.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06