Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 09:54

General

  • Target

    6542cb585ae23883d7200ee96e8b94ae.html

  • Size

    1KB

  • MD5

    6542cb585ae23883d7200ee96e8b94ae

  • SHA1

    812ec6f9655980d01a5f0fd49243409bc54a183f

  • SHA256

    3e569a211f3edadeb8a1645b032db787fe5e4c18f0055db517e0e43152d9b4be

  • SHA512

    55f4f450a5c9b8cd434b962b8ec3f92968c299d0f3036254f3e17ac588897aee8065396ab460868ecacd6abe1f4085edc176e5af43f58ae9833fba342fc3e2a9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6542cb585ae23883d7200ee96e8b94ae.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    878cde37624c2c897335a2f9ec010994

    SHA1

    8db81a20e9d681648221ba65b034726bcb1dcdbc

    SHA256

    a563a9d92bbea85ef6bac75ea2504907663e39b90b9194d942d83a97c5df0e34

    SHA512

    c164f9d70633e68b41d1364bf0fc5762d091ea04a218766d1308cc1a716a8a9a0f6f2994d558dc8fa743e9a1a25826fde2e54e9f5cd9210f4da5de1d87f17797

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    abd276f1d893dda17cb22b71f5c9db0d

    SHA1

    c9bb15f72d4328606255a5a3a35714dab8bafd6c

    SHA256

    fefe46423e944b332956c722c3d8103dddee1c45acad6c2191710c40dd0dffef

    SHA512

    a65c74c640cc27ea998bf464809a65389bdea61ef8e66d92cb9f6f77b15e95d7ad7857fb8b83a1d5b3fac93ecfabfd0c7057493e73624590a3f90304ea963817

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4836f47d8f50015b20d3e49811bb59c5

    SHA1

    3cd4de25ebc23bbdfec2adcb25073555859c9f76

    SHA256

    fd810872a8cd4f55c50b559a485342c6474b685f8c1e6fa2eb8cbf49cee68259

    SHA512

    f4908c73796105e02de730df3818d2177f14122404fca00f0b981b2a9d43e9f648bd053faaf880d02bbc395f7b118b7606033f37e11d93f277c1072e02fa4ad7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6f00cf0bab336afc2ce0cbe0de34bd7f

    SHA1

    2dffa591ccdb96f76dad4d4a0bdcbca7c4a980ef

    SHA256

    c703dbeb6f997044f464305688fcd552e60a40012ef760b4263777dec6166edd

    SHA512

    73f813809c0eadbe64a87363df93a3eb5ad41f63688500e29a2437dd41397320e939697edce65e33f02bddf866f8c2693b083c39c278ce8d38f3ab657094775e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    af823da4031e1252f589a913ba53b9a8

    SHA1

    09950a7020fb8864b6906cd86f26bb8c50f56c91

    SHA256

    af6e2fa269ee8a56e85bc15d56556a5ea2d0d7ad7ebce00bc3c767285f2cc698

    SHA512

    565eb968aadc9f7d77467b53e3bcb67db93892616c32223232b3ddf82ba1b34a7781286e389ef11400ad04751d150b308cd2b5ff5436a57c074e2e51ca5ad131

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df534fae01ff859aab765b44a1bd80a6

    SHA1

    b15f39dbf216a939c82a8d57db946659d034102f

    SHA256

    31cda310bc2af119064ca56f8abfb3f57f04df32f4bc1c39b2e53597f8a979a3

    SHA512

    0f33525c1a04b4d3cea628fcba88e8956542eb26c2e3a5150a243ffafb9ef84de4f71dfe74eefb598c519981b2e93117dc7b523c3cb25abdd52a6fd7e07d9b23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cfb7bae152591bd0d9478643417e2a48

    SHA1

    d3bb19f6953631d188e37c36d0ebf22a5bd36b4d

    SHA256

    d8575f222a569615c1a138c4231a3c4871b61df05c66614d82c43e494574bb09

    SHA512

    b78d282090992b6baafb2da9420403800e8391640a3d196d7da239104348175428dfd30cd95cc08f04e12955563ae68764f861e4400637b659cf2b62d5b55244

  • C:\Users\Admin\AppData\Local\Temp\Cab77F1.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar79F7.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06