Analysis

  • max time kernel
    137s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-12-2023 22:47

General

  • Target

    fdc13af0ac5024b0c2d8d0e3705ae6bb.html

  • Size

    314KB

  • MD5

    fdc13af0ac5024b0c2d8d0e3705ae6bb

  • SHA1

    4fddf5b8cc61d6a389e6507f217c19dbf93475ee

  • SHA256

    c98df2895e6241935b0f880782cb8c6b88913035f592d3531850087ea8f26725

  • SHA512

    f22d3462eef0e98f6acbe733f72c41d7b3f622b7ceab7b09966156aa6118860c4c4b29ef48cb6c7de08eb649ce43290f213925c79407ec88f549c89ba6ddc191

  • SSDEEP

    3072:JJWwys5uBZg+WJhIczPdYA78jrz9SdSVkw5OTgGT8eF4dZQ/i/Hc+TIPQeXEJFfm:Gwy3QJhNJSWw2JT8QuZQKE+TI4eXE/K

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdc13af0ac5024b0c2d8d0e3705ae6bb.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e674bc665a11529e4783839db85c094a

    SHA1

    b1a0180de861dab202d812d81dfa66dc0daa0527

    SHA256

    43578aa6822c619b5b590d9fa1936043a3f644d494b71fd28b2485a08e2cc47c

    SHA512

    fe9d59bf8a1f6fc61c9925d84cc32607c15dea49b36359a900579478d69e4688558673e564098b20d00002f48aef5b152f7f3a3263e93a8100ac5610450278af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    827769bcacc7f6c2bfd134d35a4fcda3

    SHA1

    30a21c66e967b6ea4fb8f7c4c37341e5fdb0765b

    SHA256

    6f8224988e5b262e9ab91630702ee0246aa303ce7493a0c1ef92444c0e0c6ceb

    SHA512

    27be1df38606647205cd1ab56072be8247d8d43371a3e91da2d51262b43ebb0211ce194f3802ce6127963e9338bab33deed114286361075b34bbcabe7b12eb34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67b9b533018318ef4b70730612e9f01e

    SHA1

    31b5ab52b416c6302c9abb72653550baf145bdc3

    SHA256

    7f892f7419902fc5535190caf0cf2a410549073786d09a554b1f300aee92c8bb

    SHA512

    789e73492ddc108035524b12bedaa46537c7720298dd93b2584720acb8ec917926bffed23537a0cceef2470f4ad0bea78ff3d33a2496f3e5c989d49d7fa73d39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e4d00005e1eddb7d7daece3a789f53d5

    SHA1

    d47a6c7c9501d97b0c0983f12457c61e766298d7

    SHA256

    2a2f5dfabd5a7a16b576884525391e389a6cccba445d21937450ebba4d7190e6

    SHA512

    0838d9b2567da04c4178dee29fe4382a08df78e058126a11ecfe33bdabf282762036df83c0b8713dbf32b746d38a3a9153e1ca7c09ff8ee6da63935bb8c1e206

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    46e23cfb22c33dc8c8217a4c2f1fcb36

    SHA1

    544692fb38c75e7eaeea044f9192d9f371b6860f

    SHA256

    29f745196edc6571f87cd3a6a3b4b483afd2c89d18670c6b89b07874fe432423

    SHA512

    5aea089856674e5b86ee03f7213cc874a897df97267c15d01ef34f5bb763554bc64029bd682f1d280d46ab5ff5ac0fd9812bf926b655eee076f5c97d53541bfa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53d785a98ba7536572cb50c9e00e5f02

    SHA1

    2464750ea4671f0aa1965011f8694ab2b2d8df37

    SHA256

    c28d1ea5f06d1571533c7d5950889071ae7ab718f47818991f796357bda6a579

    SHA512

    40272fed3bcad7cbd17c36847bc80ba93b1bc09bc2d743ec2ce883469ad5d8318b246eb5f83f3b2eaf4436fb4133bc5ab3286ee95ffe075b62c03975241ddffa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bcb398b5f1b2f99f8f0c2ac008edb4b5

    SHA1

    195646ba8600849e728f8587b5219a457a05dd43

    SHA256

    5f7ae1f9b369209861e5ea5509409b5d47935d585c5aa853b62fa07a5c527cdb

    SHA512

    bcc4f1970feb3c4ec30a55bb6bb3d77e99c7192cbdfeba44ad7bbb13e440097e2ca98d265ab545254f6e9370b80bd0584e7cbc1d57c1d0d8c6b548cde38594aa

  • C:\Users\Admin\AppData\Local\Temp\Tar6001.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06