Analysis

  • max time kernel
    119s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 23:42

General

  • Target

    074d96995fcb7c53609740a30dbf45f1.html

  • Size

    831KB

  • MD5

    074d96995fcb7c53609740a30dbf45f1

  • SHA1

    3fd43c4be2cb36a39cbe95411701106064ddc6f9

  • SHA256

    8aaedcb7e97829724a2027a36bd4fd519c0cad06004a7714b2557e09f7f53329

  • SHA512

    9769350d3d8aaed71bb0b8f8f492a40c5ed1778e10dc5cd091ad8a7ddbdb2b7bd88d44835f6f246eab75c6cb644cfcec2d347aab3c1479c92335c57d84962b97

  • SSDEEP

    24576:Q7w4gCzC2uMqoVrGai0eHIIOHmV6aGZCnp3oQlJ8V:M/m2Tq0M/p3QV

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\074d96995fcb7c53609740a30dbf45f1.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2356

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          02c48f1a8ff74f19ef3f75bc9000f18d

          SHA1

          5c0860c596512a8ea69d6d148857792b7ac72d4b

          SHA256

          8817bde10f0ed56ea8004195e9b1980147f0772e490d86d07e4a29dc6af34fd0

          SHA512

          670fc9eebd545d48f024d496e5f45973f62f3a273dc360e6526840dbfa62eecc1238a0022a9210847406f0c463bef8bc85726b2f806c4d434bff974e63c89152

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3bac4d6b899c4abb6e507fee26a68e55

          SHA1

          62d01668e2fc0733cf14cf44fd053d775916e85e

          SHA256

          477a93c69c7a01a5d7884f4231b15eb93059a603675378ec3d1399c683eab0d1

          SHA512

          bd2b1baa22b69b470412b5f1cb051c4fe94d935934c494e4c6e180c104ae59faf38df39e43c331a18b4d99ed4b4ea797788a5dac555d4e547a1cb27ee2b1d3d2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c83ea88588f3a132d36617000801e8bd

          SHA1

          1244be197b45160e004c6d1304e016704d7530e1

          SHA256

          ffd731d4fa4513074618bf872b89b8a80dc4e89053673c806f81efb858fc4e5e

          SHA512

          86d13fdf15ac8a6ff6721f2cc8689505bd16c48bc2a67f5da0718901dce45424ee61afac5fc1f55dc7971887cbf02ba46a28e98668548965c3663179c9cfdeec

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          43606987ce7f653842959e423c96d6b1

          SHA1

          f8ecab333881cbae3ab764e593bb83b8e0255668

          SHA256

          0a5dee639e35ee5e4159f014fb24da21e604910ec9f7b5238066fc98c0e392f1

          SHA512

          a55746f4a370214d49c4a10b51579e0bb4218d40a126c3f11aee3a615f1c9da3625e5197a1ab837cda9b19977d76640f8e51153ddd6c0ef860cb544342850e53

        • C:\Users\Admin\AppData\Local\Temp\Cab4627.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar463A.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06