Analysis

  • max time kernel
    117s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 10:03

General

  • Target

    65c1b442b25fbac189ca89c9c29dc40c.html

  • Size

    6KB

  • MD5

    65c1b442b25fbac189ca89c9c29dc40c

  • SHA1

    5c2b5a2b555f56446c174f978e4d2c03bb42bfa1

  • SHA256

    e32cd1593c77a4aa114b86d11065e961307a4f3ddc8fc457618a7acc8a76c056

  • SHA512

    23b57e0b13771d505e9d7d70982454e630273a41111e0338e4508c8fc6454b00fc407880144dad36b6db30d78d2ba59209699009c6da47b138af8e3c72a82a75

  • SSDEEP

    96:uzVs+ux785LLY1k9o84d12ef7CSTUvZcEZ7ru7f:csz785AYS/qb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c1b442b25fbac189ca89c9c29dc40c.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f583bc4f582b4e07f3f04d6f90946da

    SHA1

    d1a8e1b40c2972c68a2d1832adb7d93ab247d835

    SHA256

    840cb28c7a54f1c4a99e0665c6dba8f5dd67016fc6ad13ac15dcf152b0837d0c

    SHA512

    7f9fed3b3fdab0c24405e38bf7f2d9ac7ae02eba2111317b4aa232479483485f95c4ca0378d8b8dd666131eae544a0cca2e6df68f26393edbf01f2acdc56ac27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4a338640c12b5b1fb2465da8058b8535

    SHA1

    3e0aa778b487b606c0edb9fb22506c91fc982e3b

    SHA256

    06c42e123376c863c267314438e483998efff6f6c9980744be1ec7f58deb9100

    SHA512

    7004459cd90f088687e07c690d2e64c7a4ed11b6502487a12a765dc212faabe163fd1253a50ba05731e49772b18edd1ee4fc5a2f29c1a94a991b2a6794754291

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97caf22db5033ab65084a7a34dffaf28

    SHA1

    2bfe88387a47aaef6a6382b8012f67d32aafa914

    SHA256

    52bc92f265bc5da6bfef5aeeeee2011f1205d1e52d0d4d825d84fa1374458b67

    SHA512

    b87a0192724f59eeed6b60d4b6cc8e46ee3fc9e349945569cd914e78633d9461aa1f5308d59c338f59128d06cb6680f4a3145306e2484c4f039784ec710681fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d455f41dda4c7399b6ea3a2e43a5ceb6

    SHA1

    c7a90db3fb10312aba8ee83f2cc986ecaa127166

    SHA256

    00b52123beaf50a6085cd2a8931aace9fda01e3420fd7741602fcce35dedc9eb

    SHA512

    8b504cf8399be82735ef3b49271dd89ab1e7d8dc15ca28f40f7ee465e34aec0a00e7c44bbf0dc92a8e44e9342b81023132df8ca1d01f5e347ff240a7abaf4a23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    405840cf604172f138e135bb34ef66a1

    SHA1

    ff82f8eb2e22338be2a22c9d24cffc1cb01adb37

    SHA256

    9f89d0c45efa97694272cb419c808fd7f8a54b4755d1456b5cf819771c703b25

    SHA512

    fc8ef662f8efa17f0d1d79f6e96a28f13be2e1072e46ac8d7f60a75298f14aef167f6158613d1b63399012d80e8886ae067a5af1ecbbf688dfc3a063092334de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1fe6d4f448f2f2c29b817ad143cc31f0

    SHA1

    99ed29a5255fbe0eb4ef754c1732dea0ec1848a3

    SHA256

    c42697788a9efdb0bcba4e2ca87f37e0f386b8fffef6f356ccb20d89a67a697b

    SHA512

    31a58530cc89da44371849cc7c57e6f99330b0a84d915de6d17f729cb5bb60a944e1aa373cf1cc390c5522322a6afb6bce84cbd9be64567c44c3134b497f459e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    972533f33d9fece52676e278862feb9b

    SHA1

    aa88e2bc8312760c41c88bf8ed8719e2902fd3c0

    SHA256

    77ef4f967c3b35aec03ec3c87db1428d0e6806acbc96ac57806564123d83299e

    SHA512

    6112b40a2fdf822156baf12ad1c23049ed5924ac698fb5fffad7b2003d13327588fc0451c35af7660e48590becdd2e3e2ce9530eee67e393ba3dba7f6b1ccb4d

  • C:\Users\Admin\AppData\Local\Temp\CabB8E6.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB918.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06