Analysis

  • max time kernel
    141s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 20:22

General

  • Target

    02f3a22207fa611d9f59ee029216b049.html

  • Size

    8KB

  • MD5

    02f3a22207fa611d9f59ee029216b049

  • SHA1

    da1fe030b240d6ea22b9112013231532da5dcec7

  • SHA256

    6f88b85ade8ce068108c01e018e326fd9da37a1a7814705a0660167b68745086

  • SHA512

    e0bca5c920f3b0c913bf92d265998d06ecd57f297b93735d7038885bdafc44fe47b8ff5d649a06e21a2dba7fee070f035bda9a79de078ec372557d354c4bb810

  • SSDEEP

    192:zIu9fe1LarC4irDTna6NRd1qODOXu1Q0qiSH8i:zIu9fe1GC4irnLNRd1qOHQ0qiSf

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02f3a22207fa611d9f59ee029216b049.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2144

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3e8c9c00b9d979b85ddece56ed0f552f

          SHA1

          e8a12111122acec2a4c0534d2df8a7f4ee944721

          SHA256

          cd41693f462bbd10b25db2e05286790f603762595d4c460f27358c758eb630db

          SHA512

          217c71d918862f1f885829f3ccead4cd80de1f8b0b42c9da29428d89ccd3495626808f2d13a29d5fc7628133d1060f8ea0c27d1d452b1a4def8e2f9982b41316

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f1360b02c4b0b13beb61bcfffcfd892f

          SHA1

          d804b24971d35b7897c4e3f434c83dce57a5a529

          SHA256

          5396f78605b0a932f4d0cced6572a5906a0645f5cb849ddc1c5d03b4d247591b

          SHA512

          fe9082161aa5c3897877c6ac8506a37734376e7a6d3263efb17b6f4b4873c3a5570913fb711c48e89e915180d46f3d5cf802a8e8ddcbc8d76ce89d7ef002b6fd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6aba6ec6211ca0418555b996c848e620

          SHA1

          3f459eb010c6c44b017f5ce81c5d93342d11128d

          SHA256

          eed592aa4c79576b51bbe370eee0341b5157f1d27d2196bd63c783315b01543a

          SHA512

          d9eded7f8291b71d19602d77ff64574ec5d5450de7edff141a3c9c9369785c9ca0147df2c8b99398364a0d03151459e8404a5e1f00be5c5f55f11c16ac30389d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          787421c2f41d9defc39c0e33d0f4a3f8

          SHA1

          c44541bc1fe773c56fcbf34a435a87fcbb2be29e

          SHA256

          467149c63f98cc67aadadf1c829edd3250ca3ab8d9d067e43ddd7fefdc6ec193

          SHA512

          e4e98aab76ec21e51a631e0e76e3570279e12b5ac08f075e026609dc15c9d6007c51d026c1487efab974f8271b9b5383306bb5951d8295ace967f75d9b3bdb51

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f58cbf3a38bf2236fad9046c28291586

          SHA1

          f32810932b9664f4231a45d241febecd2345da4e

          SHA256

          7fee4de71e195cf5374083dff8f22e0c02b31d847365cf82f45d9b2537523291

          SHA512

          5f210c8493fec1975bcd887ff1e024f6900f6df1121c16158a7b166a9f2f59891395d0c19a5a47fe157b857c6d2fe8fcad86bd29343077cf0b097db2ef27bd7c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          39a7a6666a9faa22d43fb7fc5d9a6a9d

          SHA1

          07df932e292a37ccf8912c5a643e954065107a79

          SHA256

          0a94c5658404e6f6bf08fa021b429c27f46c9bf2723c81706d7c105c59d7ed8e

          SHA512

          57119e79c71aace3d6e39289fc229e70635dbc3bff9212eada6141df71258db5bd21ca4b0aac683eb539b01968f8752c2e3e5bccfab53cf0e082fb03b146206d

        • C:\Users\Admin\AppData\Local\Temp\Cab63C5.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar6464.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06