Analysis

  • max time kernel
    147s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 15:55

General

  • Target

    7aa5e8fa80010c59d1f22f2ec3c38714.html

  • Size

    49KB

  • MD5

    7aa5e8fa80010c59d1f22f2ec3c38714

  • SHA1

    e521d2c2f0396b7125f997fa0e62c62b1a4a16d7

  • SHA256

    097ef440922681c8661afa2e038d852f8f0fe0449cbe34ae1d3a5dc48cba4dcf

  • SHA512

    aa6e2303ba7a7e520e31452a213c2303a8b6a5bc567a367cd8657716aca6f9f85c1edfaf8a953f4b6c75f8068e12d7b60f2526b41cc8af7d80130a6b665386a3

  • SSDEEP

    768:SotWSeev+Chr0AIVtesxgW++2bsbYKLXe:SIW1iRiO

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7aa5e8fa80010c59d1f22f2ec3c38714.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8fc42798b471625964304adcbb7f7f66

    SHA1

    ecd3f8d9de7f85de2fabf32a0d5a7c9224133ae5

    SHA256

    5a4515ebcab08c129d5e926cfd9b828dc9dddfcae7c2719a6026d1ba444c7b58

    SHA512

    4ff3f7722a28a47d0d6aa576eb8eda775cf9dc6f1198182d019bb63f3631f4c4abdf807cabf4fbdcea71646fe975404054a38ea2c5f47294cced325ac3e32617

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6073ad260d825b96240f01f0ae3d60a8

    SHA1

    f3f835cfe5c4ecb343813228525a6053a8e17b9b

    SHA256

    5e2cbbf5515b288ca39c8861feaabd8fce139e3175f8b0aef8b4516ce6222ece

    SHA512

    715681cd2f54fbdd78c8987299434d61bbd22576a9fb1092e5acb1df3b61e57c6e8800dd95b7f00fc5d311d0974eee913e867298b34f33ca2cc81ef8c9c0c0f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b334d3b533a93aae403a9e2ae0c21e6

    SHA1

    161f5ce3c11d0a0adbf179f6ece68e5d45f95162

    SHA256

    a9d3bbb53437f5f1f13238324fac11736b21ace1b9e2a34ac50a1439c0e30754

    SHA512

    d261876ed8ce753144229fe396cae44611bb08b02ff7c9c71a077bf4992afcb2bf02411f80544ad37654e01d9b8843d1c3c5fe2fb702c0640dd239094a4aca3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2ea4e200ce4a977ead90d719140a7846

    SHA1

    1742d248ea34741af6727ccfe0f464cc72eba984

    SHA256

    7daa6a7755fe58996ee4839d7df6c35345a522ff28a1bbde78eaa490a4c1f074

    SHA512

    f3cec3d217bde54a0d0487310a6d133c98c5d86bbdbd004bf0b0cd487812b1bc5fb7f3c82516554efa65c84740b873a07f255d086fbf8a4163887acccdda7f32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10442f9d1900af1e130357060c926841

    SHA1

    122af1c95100e252ca1d90e945a71ef9357fc548

    SHA256

    e8cc3774781c18ad106fbcea5dd0c14051ec684ba9a43d31978d2ffde5c61778

    SHA512

    518c1fb1cb11a8c099376c74f21c56ac9770b8064d2e822b9e802a5fd15ee57abf6cf0afd5cdce6f7a234ca1c6e00aaaf847d10a8873a4a927762956f86b65e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fac4d06e32409dcbf04164d8eb1b61b9

    SHA1

    c97a7d035d03bac24e57d32d1d185fc2c1fca70a

    SHA256

    26dfc62fd08679e3f5f18d35d64a8c207deb98cbbb6d5d52cf57357bbb1fdb8d

    SHA512

    a7e93b61b433f3594f15e9520b909f656290707d838e1cef212160f6cb17b283778c9b7b007bfce733ab36a2b56d28a81e3257715b776267c6e874ae34f0353d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc3253cb2e31fc318bcb7b080a4ed2b0

    SHA1

    ad98eb488f4d674b4cc6d1bfd9d5ed84a361c74a

    SHA256

    17270f0e9ed243152f08ede5389770d538d4ed4ae0608320c8b0a828d1c9df58

    SHA512

    0c9dcbb607c3fc2d3002278a5f247af76eea37d4297dcec28f6baa850d3b65d595df0e6ceea92736d930a29ebedb72a36b385f3b540e3fa74b4cd8ac0aac4776

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b17ada5355ae0c342d5bf11fafca044

    SHA1

    369535ba8a127f4318a4bfbdde117409238a3f42

    SHA256

    4bf5a09f5f989d253a164fb71d915d99fd80e87eec468b341db925477ecd9fe6

    SHA512

    e1d1de9608f331d01eb9faa16e7ff5d686a4480cfc0f2f85805c4c2f9bd17ffc77c90374a4da4825c0c6ad744cc93dafb371814d1d6c50b5cfc1bcbdd3c18cdf

  • C:\Users\Admin\AppData\Local\Temp\CabB1B5.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB7FC.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06