Analysis

  • max time kernel
    120s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-12-2023 22:18

General

  • Target

    fc5580401b2f408ded870fc478f39f5f.html

  • Size

    24KB

  • MD5

    fc5580401b2f408ded870fc478f39f5f

  • SHA1

    8a0c36cc0ee3b21107828b81061a81d865ed5c47

  • SHA256

    0b50ca0f727fd8a6908794dbc2db3b1e01b447541609654f019ed711b6035038

  • SHA512

    fe2c2551d689c2d956787efb531f1a5187dfaf31573985ae3683a1569e7322b04a71417dd71381163a53369612f3c45ce220c11e7d8ea855ecb66cbd8c6c0c79

  • SSDEEP

    384:811bnSPxLuPglFD61hlR9OIh6i42MTpbp/sSk:8PbnqVuGFm5R9OIh6irMTpbp/sSk

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc5580401b2f408ded870fc478f39f5f.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2444 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    66d669d38abd37504453dc2ddf348cc0

    SHA1

    cdac34825224369d7ffc580ee49ed90573f56420

    SHA256

    885bf02c800987fbd5d7f05c8a8d10fe0d83d590ca88efc19ca368b6b40005d7

    SHA512

    0757f349f9d52ecdfca31f8af7560938976753bbe6340db8570d43bd4b7bb49e44df1bd778fe1b5748f144a32f4e7f83cdb0abdf68719b1dc565b2f6ea2c36e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f2f28faea92fbf50566c95dbd0677f93

    SHA1

    7003b01075143e906bb14227c2cf4402ea79fc1e

    SHA256

    542e450801e203ce702901fbd435224da6fb63930fcb18ea8ee86458832ccdcc

    SHA512

    9053ebc1cc2049ed0cf7dbe2d4156b7e1d43b11c20900ba1977b894bb255561a1871fb3549634e0350410ca8de0cb87456af1a102c9ce6143ac281338f3b66a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5fe6739107cf597ba19109eacee004df

    SHA1

    70bb15ae1e672b83cd8cff04cd4c10c27490e91a

    SHA256

    9d5a7fa9b3f671a07807dee8d7bda598f713ea6ef6282198af2d52f594266ccd

    SHA512

    703ff82927d262c1af04828246d7d69e0c46e9b24e81ce946fc48ccdc54db040fd7ce1446cd4bc0fe69e2e3e100fc7c2147601e16561c33676a245f4c970664b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ab1ad3048362545e71ec3461e5aa7bf

    SHA1

    9164bc7dd07d8fe21a5c5e961cadaac45f7e54ba

    SHA256

    9bec45c12b4245278090f8c71eafb6e4451e8892129c1aeac955561d9435d5e9

    SHA512

    90665babfb6ab0db35971cd7c6acbd3d5ef798b21e183101ce5fdeb0b3f156357bc86d9f955c2ce27af4c3d26d3cd8d034619ac543417066ac54624fb47bf8e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bce3e7104518c0e3d177587b91ca5196

    SHA1

    aeed916f1944adfcab37fa953338fb8ca4a9071d

    SHA256

    c52d04d69feb19a1227fc56f15a1c4a561d2bba4363f40baa4930920e65e48ad

    SHA512

    3bf1475dc408480f66cd9ec07d4b77c130e9468898fe6caa32f89a20e994aea36c3d60f0e846327ef0dc9ee5d20bbcbf2b145a8ce00ca66fd24e0edce60dac6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    140a69f229411adf7c5d4944c796fdcf

    SHA1

    51c8606e1eaf17d531f84c90161805323300eb72

    SHA256

    a7e2f74e0f625f2ebf23c5385cb0b59e042b403a0e33dc942872aa02803532ee

    SHA512

    ce0a5dfaf4ef0a2a2f9938cc7cc8ec5fb71080c0f2417be2628e25cc957a631d0aa108630bb628a126da9626378531501d8663d7f0767625adb4740a9675f30a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5d08ccc21c34ddc59661ce3ab59e485e

    SHA1

    77494c82ef81b5fcd1d39d8e8052e8e94fb33a8a

    SHA256

    6172f2b895cd761b1ff04c7dd1b219e9d56a30fc2efee7a8dec863793e326189

    SHA512

    234d8fce461fb10563fee5186e43270694e8e85b7ffafe5fd4ff3d26a725b0951f6d9143bfaab3bea259c0181c3e0d8e5c583b9632704c3263a23a9ad26523f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    58b2da455111369d69273a8a8124a771

    SHA1

    a0a4250b8db80dfd6bc626582fbcffc13e70f649

    SHA256

    5dc27ff4604259f86dba302cdf12e32390c2c046a3cb884736b94f10aed8e4ea

    SHA512

    0d3fa6dde9c6fea99d89b8f211684196ee1cc8c90f82406090fe8148b33f640d50ee573d62c05617e3befc1f38f2caf7f9cdfee0f2fbf73255ea9835f6f5594f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf2eb101949951962acb922deefb88f8

    SHA1

    86fd1a10b962fd664b1f97e04be03799713738b9

    SHA256

    38205fa6ae96f07ca535fcbfb2d1e6d5ece37d72d02641cef376a17cc36979f5

    SHA512

    7969875e54f44341e5ab813fc188594f64957685f90e72c3ec14696fd27eec4bb1d95432b7ad246c636c6f380c60854e2d10c64437264abd280fcb07376d8ac3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    909fdf463098a55ad22c58ca99fe28eb

    SHA1

    ddb67096a7acf9fad1608a3255f7efc144bb0e57

    SHA256

    49a0be2c42d1e1549b7d9f0b52b745770a14d9bb04d52b5f59af457404431855

    SHA512

    df7f89e512e2f74f8a124de70f159b5e959d6b7f4fad7b769969576bc7f1947669516018a6395565fdb7210ddefc64849d95be48abc5e5a26b3d3462bd749a4b

  • C:\Users\Admin\AppData\Local\Temp\Cab121B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar121D.tmp

    Filesize

    98KB

    MD5

    371aef904c2a44b47aeefa7c5bb3312d

    SHA1

    b1058296c351474166e45ea27423122bb191efc3

    SHA256

    0836be0716e46b765bc8c79b573e98af6e058dcd5ef6a6f38e29f30b7ad77ad4

    SHA512

    8a40153454ad5319c7e5c6c5e6d818a483bdb3bd4a7d250359e8d393ff87378a384ff007a80ee9ed76243f83a7db1662f3b0d5c7debfe704fff8e724f7886812