Analysis

  • max time kernel
    53s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 22:02

General

  • Target

    05159d19aa7206cde38ddf43c6c6f5a0.html

  • Size

    65KB

  • MD5

    05159d19aa7206cde38ddf43c6c6f5a0

  • SHA1

    4c24b39fd0afa0f3e81beedc3d2925d21dfcd2da

  • SHA256

    4873f25a1c0c5e4eac5405e76833bd86609f4ae15eb4ce24012887b233b84a23

  • SHA512

    4e566a2c302b546665bdb84d813d1288cfb312351d0204fbd2a0b2fb49b7a786b0920f2b92d1284bf5a1ac5f85d7f6d57a651769be117699ef114aa71ff7c5f1

  • SSDEEP

    1536:P5X0tRBH+pMbkB1UWSjjdvJiW4Wi9qiBE7VixZ8xFYldf:RsBH+p3+JJi0i9qiBE7VixZ8xFYldf

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05159d19aa7206cde38ddf43c6c6f5a0.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2316

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          82d256f5ddff99723ddaa0c729881173

          SHA1

          fd9a44c8baac9bab8ffcf5cd844d522e2a70fc86

          SHA256

          27a660ae8f21d28d56302d0607ee979d64b597bc90c4ee786027d9262e487949

          SHA512

          3454874f9e559c3daaf37db697050dc7035f16c134134b08e5061a391ab63bc003bb86014e1b18641447f0f0f1a87550910b62956c4102bab7048b936133d338

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          62aa5140cfaf7ccad2750295f5ad511c

          SHA1

          df815e0c5ae7eb5de6801f9a71c6b11669b72141

          SHA256

          898694d0d4bdecd6b643b1fe10aa86c9836657d7324b8edd7710f3c5e93a886e

          SHA512

          2e2309b5889eb0a2ce10f148c850e20c4e8b2c1bfd301d1f62d21bd3fe2edfb62d61bb543d922ff6aba5b2757030b7c8f3701e8966a3ac3c7b40fc8db8913dd8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          87d0e9bab40e3519c7131602d305b5a8

          SHA1

          a1556e4819649974b685082c7edabe0426f1c4aa

          SHA256

          80284763b3a5a7234bdf6c350d09276e1f3c2d500fd78a52b0990bc2353e5824

          SHA512

          81cf02b3366176e6efc1bed605b1a045a9d446eac173d47b54eb75729f3ae4813353d8cb731ca7d6ef16550f90d49aea63590c8b67287b54cf56e9b556270c70

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5022d0afee17a3f2644de4050e341aec

          SHA1

          a65517eb921ed9ffb4209be2a72a3af4b71b9edf

          SHA256

          3f492d77be095b412ab5f69a000cfb52137cd8afa4cec41c5ef3f7c0755a0c0a

          SHA512

          9942d72f167af507f270fa9b90c3cb1c482cb3e0aac5f52462f8eac19fcb3bcadb61feed2ae492c7fb894c7978a28a0f45119ee93075d34913b4ccc91482e9e2

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HVBRC7A9\AUWW7C25.htm

          Filesize

          83KB

          MD5

          fad84a368a4dc620f14bebb1c17a7148

          SHA1

          d4abc5631385e2b267a352a029ec2ed4f2023bfb

          SHA256

          84094a75ce2d260134bccbfc7693865c45e98b722ee48d6a0f6f5eeb01f9cff6

          SHA512

          9219fcc65af816aa290f6679d759df0b5d9e48ec06af6c62ba196290a9345a23b8839d63ad90a277c61c3a8a612c574bb13765bd16cc84fa43e2a8ce2f3677fa

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JIH1AB02\style[1].css

          Filesize

          5B

          MD5

          fda44910deb1a460be4ac5d56d61d837

          SHA1

          f6d0c643351580307b2eaa6a7560e76965496bc7

          SHA256

          933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9

          SHA512

          57dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1

        • C:\Users\Admin\AppData\Local\Temp\Cab1611.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar178B.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06