Analysis

  • max time kernel
    120s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 16:51

General

  • Target

    7e19661e8c3a41ff4ba6f29b6f621bdf.html

  • Size

    10KB

  • MD5

    7e19661e8c3a41ff4ba6f29b6f621bdf

  • SHA1

    12d3f7e1638272e8475629f34cd6f65853ed95de

  • SHA256

    dc2863cf7f7e4f9549f17e27f7222475322198b9ac594e4a1b8e97a832ea7412

  • SHA512

    67919f492918697e77306dd9ed5826b04fd639b9d82367d7928a687b662b36e20d1cd57916ca6b0778c035657830d1beb03c4de41cf3b19e3f1db3f436f8fdbe

  • SSDEEP

    96:uzVs+ux70pLLY1k9o84d12ef7CSTUWwGT/k89tplNUDMSqI2qlVHcEZ7ru7f:csz70pAYS/XgKgYDYPHb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e19661e8c3a41ff4ba6f29b6f621bdf.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2832

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8ce6ebe995d06fcfb398876d18e1435c

          SHA1

          eda2dae5b98e56d8c470d081cff6b1320a84b213

          SHA256

          941bb6efe607e8b2cb51a95c7fe2f92f1ba47a7edc0cf3afb98781b7d891aa32

          SHA512

          a298fba99f4c906c274792b268826e0d613b06aae6a0b03b6e2e5257ebe25df2bac773c7673d234f79ccb9b7f467b63903097082764c118120cf49fefce6ddb9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          cf961f8446b75bca09c59d8129541032

          SHA1

          acee9d4a8e534e86d81c543d3bddc961d2772364

          SHA256

          faef2e3007bf2c29ca130522f7e453deea3ec02ff4f50bcf1ed533cd672b7958

          SHA512

          d0fc91057adbd097de609b323f32fdf1a1833c45237d5e3764df72a3cc612da095bded5cc866d0ce4c3ef41e6f10167c3ee9b54c6ab15b8490d20c11d681e111

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6aa4ba11c494785c96f284ad45b092c3

          SHA1

          d7d7a8ab184f02091a5975e1160335fbcd72e32d

          SHA256

          40d06e97f616a165f1746722839ab2e3121174b9245506d16daeae378efaf63f

          SHA512

          79d63179ee66615b543549046e9f83fb2b6583d2ae60f4ff3163704e8187440fe687bae58635d9c6fe22fc50aa5b1ac2957d50ec192d510a9c21e50fa7d56164

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7c092455726950860dad6ce6171ffd05

          SHA1

          3ccd7d205d60f803e17c1df8f5c43e5122e7f149

          SHA256

          ee9c295c2b6185126eb3a3916ce7d0f10b50fb0ee49011bb0e964fd27e7e9184

          SHA512

          bf8144a3a5529b313981ab6790f1847fb5c3dd725f7fec978ffeded8d583badad2f959eeed07c30544057b55d018c1e85b5b5a0932feaa23cc984241e26ec238

        • C:\Users\Admin\AppData\Local\Temp\CabA4CA.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\TarA6B1.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06