Analysis

  • max time kernel
    67s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 14:55

General

  • Target

    772f7383c4ddf0d45e6ec042876a2dd4.html

  • Size

    21KB

  • MD5

    772f7383c4ddf0d45e6ec042876a2dd4

  • SHA1

    8209edf254807847b3a378e354062888f74d08c3

  • SHA256

    dc933ac456375643c13edf7e80ebc369a576c99ce9db224f915303c76e29cffa

  • SHA512

    1472b980f97f0968d9089a038925c323663b772cb5bb46c869acdd4813f0a86ae5812b2087090efd858f3a52cc79d61b586018c7897dde056832d81c78bb2e65

  • SSDEEP

    384:Gu6XKLo0lNWsdghKgANbIITHcf2cYIHI8L:dlSW0XL

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\772f7383c4ddf0d45e6ec042876a2dd4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    775f25a31056b0ae1a233e85585249d6

    SHA1

    33843eb96caa5cad593aee9c12107ce2cd60e8f3

    SHA256

    71f8ebf43fc7d8fed4e72e270f6e752abec62674c520b20db0ea1d7f3415fe42

    SHA512

    3617fc239ec4d2d7fa300ae69372fd492aaab8956e85eadf13cdfb0d84487c843a132ed0916d412890f9bde43b8d9387863cec237fa1c7a897979315092bc71b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f87dead53902fc9ac10a681d6a10af6b

    SHA1

    354c8cb087acc5f3025b8cb1a61111120f8e4c5d

    SHA256

    fd36076ba9500b1fbec6ef53515f7e324bfa7a7805ba2ce6d3e8417861e4da6e

    SHA512

    01f14e1419d491259a745019f91c4089ab68d5d69ac32883831038cc51d9c14392fd252d48d51299f7a30ce2e6a01cf1db7e92496045a5f7ec562434d35c1865

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f22f44d6ba0ff86e5d50043b1a50f69

    SHA1

    2d62db87d5313969f05224ab5498b7cb6867428f

    SHA256

    6af347e68ec2f986ed411e2a2e79b136ce7ea7dd6c018acbd92d2b407b5f0452

    SHA512

    5fbea491d06af7a75d578b34d6791e97da9275433f3dc4eecb9fba3dcefdfe75bc29c458c50552ef485f9d9e32598ec74a8083f6a17e42ee31d2249eb1e52ef2

  • C:\Users\Admin\AppData\Local\Temp\Cab10A4.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar10D5.tmp

    Filesize

    95KB

    MD5

    25e5c004485abad6ca17d6b6d9692b35

    SHA1

    8c32f0cf8c2d005007690cb246d47d1cba187040

    SHA256

    0a8c1e9d08f141719351417d710ff6a389fff056b61bb6455eb9ef0227058d70

    SHA512

    69a7fe2cc9119129853780b1e329cb583c08ac4440872a95e940a5fd30264d1a9c506c470bec3abe4a9fc20a21a53d59609846c31f9b2902b6ce07231520d363