Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 04:55

General

  • Target

    55e081dc4e58237a0a9763486336de12.html

  • Size

    76KB

  • MD5

    55e081dc4e58237a0a9763486336de12

  • SHA1

    68a9463e47855a50e398045b4a9aef0d285cf808

  • SHA256

    6e4172daecb4c518a1fbd4466bcd8d7a32cd641778d45492dff5e5d419eec91f

  • SHA512

    3b21b84131056f0f08ca92592429314a1a703c7efd312c84727ca1b8b0f5769bb820fbd7dfd94310d7cfe98c61915c63d9e866dcd8103bb4026baa1d3618414d

  • SSDEEP

    768:ZnmFobitaW4Q449PIYH46e2csWgOae6VPh5hwLBhNvhNVhshJhW9LKvh1QhGAd99:oFobuaW4Q449PBH9eXjgOac92f68HGIU

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55e081dc4e58237a0a9763486336de12.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32e879ea3ce70552048b15fd1ed72795

    SHA1

    c2d21c597f538370a4682681339f0ff978dcb15e

    SHA256

    f250238b15719d9d82c7ca1d14dd04fef8ea257000cb469d418166bb42ff688e

    SHA512

    7e11cbb721ec0c27d5a9d04e53352feb7f60b1c5637d93453fb55bf580d12d551b8c7dd16f09159820a557b465403e9c01f4fc0389192746691142bf6ceeaac4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6e19674498f9713fb6498bb5fb18cdc

    SHA1

    56cfbbe6339b0644d1de2f6df1cf2dce340f6186

    SHA256

    862781184fa2ba259e14aa48f1f668fbf7f0940a6322fa71fb3a3898cc0d1dab

    SHA512

    981fd17f91b8445b4b26f843952d4c5df7abf12ae217b720e3e0c918d0ffed8aed5afd3f3a08fb4818589aadce164306e8740ad707b776797eed845356a93d21

  • C:\Users\Admin\AppData\Local\Temp\Cab538F.tmp

    Filesize

    12KB

    MD5

    6dd000cb614d2bc545c6df81876ae7ed

    SHA1

    6c4df8577d651c2cf854dc59eed1bb04b3ecfb75

    SHA256

    b4c90f1031f6add98d84d12e7871cce9a9f98a08f78285ff91680453f24a7c81

    SHA512

    d8f9684ccaee6b6623c4edb9b869f5c9b6e81e4f75d0f68c149a0cdac96eb1a0961368b94290a93e4502ce6df000f46560ff4b2c38fae794c6dfd02e1dd389d1

  • C:\Users\Admin\AppData\Local\Temp\Tar53A2.tmp

    Filesize

    1KB

    MD5

    fa527dcd6b5eb05e72fc51570a2a6608

    SHA1

    3380c5ef74408265fba2f67e790636d0ad0a51cc

    SHA256

    4dc7a4a6cb3be2c334a27a49df89f18f8f91749fe6aa1cf28d548e0e0c75ce3d

    SHA512

    05c0e217c433949cab210102a26ca7f6a765515b228b217e25c7409408fc167b5a59a8494e1181284e9ec72849c90288f3a066faa284e29d871097ec76291a5a