Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 10:12

General

  • Target

    66548af5f0a7aa22bcb7dc9ab4cd20c0.html

  • Size

    118KB

  • MD5

    66548af5f0a7aa22bcb7dc9ab4cd20c0

  • SHA1

    8d14d7d0fa98496cde800d1c842b81d8b850952f

  • SHA256

    b8d097346948159c5399f6197990d7b935c4db8523a3100f545064d506a1fa1b

  • SHA512

    938e0f7df060e4a59ff76dc6be43764af7b6bc89fc4ccf978e8117c7cedae1366fcb88c0deba6c9b451ebec7e5293b5e0bae6bd6d69d4d84d595a27147f64539

  • SSDEEP

    768:7ok27iKKLprmGN1k3mayMyVzv61/rAzhbDjYh32K1CK7d2bIjozXEpWKr/oqNsmD:08VhHbU

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\66548af5f0a7aa22bcb7dc9ab4cd20c0.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71f7ac03ccbd6c085605f2c79927e712

    SHA1

    1bb8fe0f8817aeab015cf9ea16f65576322e3ece

    SHA256

    02f8f797336bf5d10d6ddb17ba94b2baabba3ad7f84f0a4cdffa0ae20314b06f

    SHA512

    eddd5e4e6c3d963c13022d0a2e90418d7b065e405ea2da1831511abaf2b3799733b01b208c52f74732f0be42f1f76d4f8eff498149c46e94ed4cbd1ce3f86e96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    40e37405dae178a6e6d1c1dd0f2e8ab7

    SHA1

    21dca514b6ba631dec8ff4110fadc8a8be2e2db1

    SHA256

    5abe70e8f82319a5a9b8e169fa054970abee3a00c821f97e4a55f897241f0890

    SHA512

    bdf1396df871970597084a775ec664769cab64aea834eb342903f0eaf17decb4074c95745793ec301c9b9795b9744abc9ac85678c60a36c06fdb82b41e9ef53b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d5152832c923b8161141e8c8bcef27be

    SHA1

    6f7a6265b7b1c16966564143cbb79b8e36d9a4d5

    SHA256

    5318dd8b8daaab81175b0dc0442635ef38fce6a1efcbc94e49f78a41eb5baf89

    SHA512

    590d7962844c2422120c23bd7f6f0d6f5242a7e43c825bba1aea26f46da39cdb35fc442f5bec36dd152057b0d94e7415e42f60c1c98efc808f536d9c876fc6d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4eae83459972b896122e0edc9995a886

    SHA1

    0e56ef27e042c2edee64aaf9892a84eff1fdf05c

    SHA256

    94a326588a95e2ffb67f2f60490d5c56e4c27b94b566fda6b323d3782da84b25

    SHA512

    f7170ec1991f33a61369f99d97eb577aaad063d3832096d876dac1c56cc633133489d0e49f54500690ae87e838985c1975a282a09593e551370d598783fcbf67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67a57cd77bde302781ef09032057057e

    SHA1

    dbc12ffbcb2cb97cc9e9d88c16481bac3081c012

    SHA256

    3c53ad8ea77e0540f146899fee44edc56f94f0cd0982b2bddafcfeea34fdf61a

    SHA512

    26ecb2ec8ca2a954597cbee5533e8f50978a288fcf6148e3675da0b53e8c748c901fc63b324065d4bc4f64c2b5e083f1513b72d680a15304b1df9a4512aaca69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c18447ebc11101b650439c4f504872bd

    SHA1

    db053f39079bbb1fda029cf715b0d8f37b57d943

    SHA256

    e4f33cb9b0725b704387413d32c3d2da89c81de30eacbfd9aebe09ff6e841806

    SHA512

    e1d33cb72cabc3d97beb5872eb51081b3302ca2c9b430d4b990191c37d80b87be87b6ceefbb7ae4dbd1a9ba140ea50713f876fbb9c79565234f20363a6cdc190

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6cbe5812e187419529fa9d309ca0b01b

    SHA1

    ba86e51d4247e04c066d9dce964f3ad70f80cd89

    SHA256

    8ada51b6bfe5fe7375a318629b17a872d4e01c364d172bf25ecffeaf23bd169f

    SHA512

    eb2554dfc06fd5de311d2053fc4d2774aee6e13a4cf9fd91d94c40ed09e7b15cf626a9e56da86a146f7681f50f53a91eaacd31f417b2128e032a0c9c3af0bce8

  • C:\Users\Admin\AppData\Local\Temp\CabD6EF.tmp

    Filesize

    45KB

    MD5

    dc38d629e51926a750b443772d7c8c65

    SHA1

    2868765523e76b2e6706f18ecb665f4631a00d00

    SHA256

    21a98ea45d4ca76fc03cd769b01345da379395b41295e1506644149d0a378883

    SHA512

    beb8198332e8771a0475a925a4b31a8a80df9a04dc889442d1a4e024b1b66709acc3e347d50af1868d5d0c351d489cd454fc2523f752ea9dec56b9a9d6048ef4

  • C:\Users\Admin\AppData\Local\Temp\TarD711.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06