Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 08:17

General

  • Target

    5f18601fe9f5038b339f174c93b03927.html

  • Size

    58KB

  • MD5

    5f18601fe9f5038b339f174c93b03927

  • SHA1

    44b07115ba8991351680fb4ddf6de8ee1e444464

  • SHA256

    dbb8cd4016bb328d9c1897dc9f524bfd84fced3c6aa8ca022f621922f92e120c

  • SHA512

    6e0cd74969a9ac740a89b41c9fbdb9f5a783ef0fd0c9b81b0950cea4754aaebfaaae57b1045ac00f90204b8c7d08d75a696a3f17932163a99f31dab5f8be7749

  • SSDEEP

    1536:gQZBCCOdl0IxCwBKpfxyfNfefYfRfmfsfTfJfpfNfgfVfjDf0fcfKf5fTfNfhfqT:gk2v0IxwclmA5eELBhl4dPM0Sh715yZR

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2480
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f18601fe9f5038b339f174c93b03927.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f3e080271218816d460919afc21e892

    SHA1

    3909c9e7b7d6b897edd9dd066999a45ac3366a4e

    SHA256

    b0534eafa0570be4061ebd5c2abfd5f061e362210ba2ca8c4344ea883cea8354

    SHA512

    a02f01e127f101b74920a83f93e76ab6632ae20fb28bb1cb7fbd183434f9ac67c6a4aa9c116d4bc2cb928beab7d0f9bba150200f75a05e291ecc94610e354611

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22876c906e67cc9788ef08c219ec5fd2

    SHA1

    3e38fb5a2d91dcd21ece6c31ae3038ed48d60bac

    SHA256

    86bca2aeda20dde17771378f526af685cd833788517ed470e14d79516660ef19

    SHA512

    fcc461fd1b1f979e0a98bc80ea01332a9093c864dda684fbdb0e4d31d283ce2f8a89eb99434dc64b06dee767f94b3bbf4dd5e926ee707e044223c261286f822d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    40b5ed6dd29918bdfe9f30d6a0cf63a1

    SHA1

    5fbc87ae68e992c947d1676a15b3a9e34b4375ab

    SHA256

    fdfe89f2608e095cf915db584ba5f7bf944826fa5476243a3331b09169a55ae1

    SHA512

    b81e873200b0a8e408fdfe1729b42aa97c7edb06cb54cc7b59409cd05f04caad1de84c569d5b861541896724f4812f5521956f3037a6b3c07673abbe11108e5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fd79a0cb2e3df209f3f100f97a6856ed

    SHA1

    16ab1d862c18c8ab3b28ab94c38820f5e554b6ce

    SHA256

    8e900aa27dad1d8e73936a6574e16f7b6c72e8e59dbacf491dfb36c04e42b830

    SHA512

    81ec16875e8bc7e883e330daaff21fd5d97a8371bf22a59440ea5f1d49c09f8cd75fe6b6eca18f454cd789844f80737394ef87692942d2d8f45573b5f9bf8c88

  • C:\Users\Admin\AppData\Local\Temp\Cab2BC4.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d