Analysis

  • max time kernel
    0s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 15:40

General

  • Target

    7997b9a2f1ea364e13b690776616b151.html

  • Size

    67KB

  • MD5

    7997b9a2f1ea364e13b690776616b151

  • SHA1

    78018ab0f37dc047d2f82173c3b66709394d7ab4

  • SHA256

    e3c40654c1dfd338b8320805f0188087ad602d8f2d5f7a3a1d99d3232fb0efec

  • SHA512

    e527ccbfdf66dbba5db635e2244e7965c876d3103308b48045972970fc906be7d6e88ecdcf670697eaffa4882c33909b943e431995d0a84fb17f508cbdb43e66

  • SSDEEP

    768:SV0hqGbIiP//mdvsYSgLj/DVWmTMYq8Dfr7Vq3t40MSxjfLD+PHgkyMrj3DZ+/Vt:SvIk/ftnwOHmxucR

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7997b9a2f1ea364e13b690776616b151.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2448 CREDAT:275457 /prefetch:2
      2⤵
        PID:2440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      f377a91d55184b007e733362155d27da

      SHA1

      270ee976754ac89640b982eddd50a4603a294796

      SHA256

      1f2e14da6082fb0e0a23ebe682a71a4e0f1194fca7fc7c1076b2e5d202d5eb0e

      SHA512

      6c84fad4fd38ead7b7982144cf10e9116a34253de6ac97048a900e1c14bca4828861a52505a24ae88da106c7212947085a6e01a5fc88b79e118db8980d07057b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\N9U34IAX\ga[1].js

      Filesize

      45KB

      MD5

      e9372f0ebbcf71f851e3d321ef2a8e5a

      SHA1

      2c7d19d1af7d97085c977d1b69dcb8b84483d87c

      SHA256

      1259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f

      SHA512

      c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f