Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 03:09

General

  • Target

    4f1b410a7b9fcb0701e140e8e79869bd.html

  • Size

    57KB

  • MD5

    4f1b410a7b9fcb0701e140e8e79869bd

  • SHA1

    7a3da372ad7e447694e4008f93c256c9a471e496

  • SHA256

    dd0afd75a0a432e5c46561f5cf456503119c6d8ac20864cf62442cd13e0a3f2f

  • SHA512

    2c6b3eb221570e59f0ae568e1e0e3e54e6984e5bd5830d2248b303a1dfeaf3295c65f4e763b5da41330f70edc35544e035fafac91ca33d1b33de9187a954daa1

  • SSDEEP

    1536:gQZBCCOdC0IxCoD7KfAfHfGf7fVfOfbfFf3fMfkf8fffDf/fAf9fXfjflf9fnfNi:gk2E0IxwI/OjtWT9fE8k3r34VfbNVvli

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f1b410a7b9fcb0701e140e8e79869bd.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1072 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2640

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a283de188fdfd0af13d227455dec7226

          SHA1

          baa74886cd5550d9d4fab8117b272ac8c5ba881c

          SHA256

          6fd68f43e7a339b19405ef9e71cd95493245f89f353f43e0297bd4ae221e0b8a

          SHA512

          a00d09dcbf6ccdf44ce796592172f4930776171d6d348e371e9c9930b168b3b124e8839f79a73a7729045639917288b3ce1b0a6eac76586752d7a2b5563707cb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          41153573bc5e88a123072895a5592c0a

          SHA1

          a02b221b8dcba6939943822c34183474aca9d9cf

          SHA256

          74e6344a8a9f77eb5725d9346944dfb18e8e79b35e19849c6a31bba0d1f71a04

          SHA512

          818cd649bacef56e43f2d4eb8997b331ee2eb8f49f405e75f958ae19b77c521ebba786406fde5649d077959e879bfc36204db38b642a6efcb6960a0e6653f1f8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          09d0ec3c5e16c56370d6c8ad41ba56e2

          SHA1

          af328883386a4242512f1c79d0e004574e8f5036

          SHA256

          0fd64fd137bed20bb7df1af9ca07d708a1b73fd90d3ced1f778c3beeda6dae64

          SHA512

          ee8330e0927743524a983bd6167e509824c6271f6027e91234d12ea9930d8d17d4adf1f4da85ec907572e6f0ac517f061ac9c2b642902033d3fc4c328f2c0043

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          615b8b6dbc7f5178cffd8ca5ac04ba43

          SHA1

          1478f2ee8fac3dd8e1be16c6cd82e9305e3d042a

          SHA256

          308fc75644b9f87c9b407ace6836fd7e15b9328802840427d7bde6eb5ae97dae

          SHA512

          9d2f03ebaa5b80cc30125d7a3591ca5386a00568d84be78ad409d2f464fee044eec901e80842dfd0e5585cf1f749482f2138e8f35cd12d57ad7635ba8bd8fc58

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          bc8841686c3a3793d230b3953ae27730

          SHA1

          77531bc5df50ef9c4ae5a15c458a582228534407

          SHA256

          f5beb415352ef1c2e538e5dd3802964e905ed72696a4db5eae82743dc9535325

          SHA512

          4653446921fe18a71d543bda2fa3b20aa127a9bce76cf640dcd152b2e27eb63497869cd1d8fab4bd38811629836ca7d7957fd919c121b13cf4a806c2f56b694e

        • C:\Users\Admin\AppData\Local\Temp\Cab4DF3.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar4E25.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06