Analysis

  • max time kernel
    133s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 22:03

General

  • Target

    0519ed4b5cd1172ae00cab1b20926777.html

  • Size

    30KB

  • MD5

    0519ed4b5cd1172ae00cab1b20926777

  • SHA1

    6a303e8d13a785a3dd910feb1fd43a129146d4de

  • SHA256

    b6ebff0e4fb62506d99bc4b163d689a056939997023688ffeb296d57db43b912

  • SHA512

    fdd2037e94cbcfecc229884c91fc62a9863dcfdf8585929619d61786e1834f79ded94cf0f45a64c0be7f3d4024b4325200f66c8115b87d7dcf62830fd864647b

  • SSDEEP

    192:uW2OChcQyCF55ob5nrMTnUCCzaIKHne/2AnQjxn5Q/hEnQieF7Nnz9zynQOkEntG:8Q/fcdt1RXOH

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0519ed4b5cd1172ae00cab1b20926777.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2432

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          bb5f794b85a9dec4ebab5b0038b476d9

          SHA1

          d741a2d39c5d4dffafccce947208527d96a141a4

          SHA256

          705dbbc016b2ec20e0e7647228a2644539c28cf801df83ad7626e209a0815d67

          SHA512

          f415f77b22c6cdd7ecd83f94e658ad77bcef90d2577c81227c2a5cc9562fa8f157021acc9613f6a88f415e3381c02cbf573f8afb3c69fe791b0985951398a94c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b30025563c275f41adc103544ab2f776

          SHA1

          40228741ecabd8edc35480cd7faa5a38a4f8c1b4

          SHA256

          5223a9bf7053b412a5c24b3e904b8f5020ef7c6308f75420a8352901d88109c9

          SHA512

          ea35d0d9bf4e61d770af813a6a51ccb2408a7881698320950b7eacb850909a372c555ca1d193a36171c24be706fbf5499019fb81ff956bf393a4bc72e1ec0ea5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f65b4ab56f065763c157dbf92281e91f

          SHA1

          7d0b16700c3306b567616950fd66db075a8daadf

          SHA256

          6ad7fd72b5bb710901f28193f5b863f59f1782453aabf94e2b84e90bdaad94f1

          SHA512

          33d76478add90855dc6dd1a710cbb4df6125ff185d7081edef14e9b70b3cd006c40b9b4799238eaae267a2f5659aa17d1153e9f026722d9d985d8f70d8905f6a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6034d1449d7c0cd357f1dae9d5664c3f

          SHA1

          a7ab4b94b514c1c5fae67f45e873ed39e61f6fa8

          SHA256

          b9fadb27b0617a09ff5820942df2e52a0a2921cd5a5b483bf62a68e674bfd3af

          SHA512

          82fd125d0d7434207da70d7d08ff827782bdf083c601b56150d18a6b7432be506024248016a71bdc1f6987fbfb9b9fd0407e90b80eaffb02dfb10101684233be

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          485f9802cbbe4ea84e4434adca8964c5

          SHA1

          8411993caedd59d4faf611a69f732d3b393bad8f

          SHA256

          6a66e0bc6a2d4455f98d7eae71a7abff7c440b42b556d22abd50982a861a6ef5

          SHA512

          28d6a457eea7b4b6ac9eea5b963c5c1080b9446f4aa1ab4f5af570c74d11812f4f342359167fac4215bb41d4683ca7ed490718cf5d243ac89f276f8f2b485a27

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          73d4845d1fc615e0c64c2efe821aadb5

          SHA1

          0eee72070e76fe03c30af95c831ca7a27fafab1c

          SHA256

          fbfdd99d8785af6adf0f8b5adc3ca6d8dd3d61bd2a2b19e7609225f3d7432cee

          SHA512

          0dddc34de786ae849a71905466a0eb0d9d77ad4e27c6fe1ed153fa0d0ce06188ba8983b24fc6b49e6155d6d0f1e4fe581ec680552528dfa147414ca4c73fc6a2

        • C:\Users\Admin\AppData\Local\Temp\Cab3AB2.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar3B41.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06