Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/12/2023, 21:43

General

  • Target

    fa2e1deb475dd3b5bea0da32e71ecfe0.html

  • Size

    57KB

  • MD5

    fa2e1deb475dd3b5bea0da32e71ecfe0

  • SHA1

    fb9a7bc0237248b07cd861b8f8612c8e54fb38a5

  • SHA256

    85c7c984bc92230b4e45588378a5a93dde1ddc9ab2f672f8f5998ec11a07b4d5

  • SHA512

    93ad3f09ad1f707a2e4461c940f1bbee8d74358b39cc53795e0e456162877bef30fb2443ef3d194d8cd8b1670420c80c36fa4f9a3555b34f5238624458889b3f

  • SSDEEP

    1536:1w3dlDZvnV35KNEUtszjl6A1jWnU0UWsHzhzA9nU:1gBGtODAnU

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa2e1deb475dd3b5bea0da32e71ecfe0.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:2
      2⤵
      • Enumerates connected drives
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8fead14675d41afb6d675bcafbc5ee6e

    SHA1

    9a42234c3a612cd02c0644ec84256633651ef923

    SHA256

    fafd3f5d4d1cf6a4530e1790fdcf8a88b59fadfc7bbcb1edc0d83f9382338b9b

    SHA512

    d61af99ec9a0543989129f3f7091af60ea181d27a705c26bc395b3a6d103b74af7dac1e954b694419c402a9bc86e5e9422ce9fd8b54a82784b973a1c6d7f0eea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1d9186b3c73d9e348d7d0e0b1149d959

    SHA1

    db47bdc5e97604c4daa85f73d09cfd3b6e9f532a

    SHA256

    1fe976d9099ac613710e2a966ab15cf255eecada8a42929784e9ec6760c7461f

    SHA512

    fd1f12343d7e673e14ba8d6f7a1f1a8847e73b3f2f47d8346b6cbbde97a399a5cf1dc84d7f61ff34c6ff2fa7d449a909abbf4ce597dde5b6037f38d01ebeb9e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    efff35b6af2e43937544bc394408f2e6

    SHA1

    de7e886a4ec5620f292c99aec726cc1c88d957a9

    SHA256

    dfc4d6d36388ad2203e3af8ed7938aef039c5396a8384f27a1f5aa9b68cf6f7a

    SHA512

    4ccbf391fcc73f7a841d460662ba167fa38994847eb8c83e938fc8b79205d4e8d5f271a14a2b3871d467d9b00be2854c496b8cac8ed85dc9b610608f6a960de4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8515d642b3fc3df4f9b034817faae2de

    SHA1

    481baf40352ffb890b5a26c0cf34317a1b93dae3

    SHA256

    5884e5eb13ff4e0d4c7d8c8edacd972a3f39aa98d0a52080a6d15f1837032433

    SHA512

    2e0ff1ba552ab4ef93f9ff6528f561c7ceb7212f0905c66efb4b76f75b4cb18313fb1c44375c9c5ce15c6ab8b591c0665ffbb0247ec6e6af7a212f5d3361aa11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    755a996d8cbbfb67ca19fef935b5be56

    SHA1

    712ef6531f117e0e8bcc1e169ddc94a5d6edf6b7

    SHA256

    995b6f525c767f8dbe22895cbc97eaedbc5bbe48b17590f9e3b7171a167aa755

    SHA512

    df0439785807632595be94e3e5a7c88f6d42dbba27a043ab3731ae6d301fe820314f6a487e4f5f60dd9c32fbcfec5aa94b91e1a95718790b54a36c755eb7a489

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    36d356aa202231514650f93e850efab9

    SHA1

    3b16763f29e2a9f31d1bcb2a170d513c475c3bb4

    SHA256

    53002b037ba46ff5813f72b4dcb2894554748a8c136968faa288ff71bde038f8

    SHA512

    5a53f43a443c5a6e34fe9c7d99bccfd5f651cfbc67057f00dfa5f9c740cf3cf07acbe1a6e649482f0928543a4c8811edffacf2a363c425f0a529c3134c7d78bc

  • C:\Users\Admin\AppData\Local\Temp\Cab6EDB.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6EFE.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06