Analysis

  • max time kernel
    145s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/12/2023, 22:32

General

  • Target

    fd099ea6319bcbb5b6ea11dd78bf06bb.html

  • Size

    1010B

  • MD5

    fd099ea6319bcbb5b6ea11dd78bf06bb

  • SHA1

    04a4f489e2a813a9626f069ff01518b0885b5185

  • SHA256

    9e001138fb40c1ba22ff47d86892f6751f24f3ffdd7c8126e58c225f0a86e029

  • SHA512

    75da9dd107056c528045a3fb7e74ec699b4bb6a801b11ac0294c019a89e58053cde78a0c4002d47d0b6b5ad3dc2c339d596cfa5965593a8879f6c41066ce7a5e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd099ea6319bcbb5b6ea11dd78bf06bb.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9c1c164491bd319208aa0e55622923b3

    SHA1

    8a18389c26623ec71182824c92a2b1fb0dd7cde6

    SHA256

    e551117e52793ed9254a2d097b524d6af0d93554629e45948038aad7811054b2

    SHA512

    093a312bf5269757b56f114143dcd6e4d023a78d8013b1219722a29713a8ae716eb77d1eb01cf9a60e6b05cb11f0781ae1640ff8b994fb6807ea5aa5bf1249b8

  • C:\Users\Admin\AppData\Local\Temp\Cab24F1.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2562.tmp

    Filesize

    93KB

    MD5

    ac61eaa48255890d137c13baaf731c5f

    SHA1

    f9ae28f6c21358660ec40239618f6ef9f6b333d7

    SHA256

    a1535f48249efcf97d37e825a27275a4e0d7e4ac51bceb4ff1262956c6e48c2a

    SHA512

    e36257b46ed34c2ee03231464ec70d889d35ea9f7f9255ea8bdb062838df8a4331fb6e8808bcf52323e4c26d6c6e9be8af4babdada794495237fd51f75b79449