Analysis

  • max time kernel
    122s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2023 19:37

General

  • Target

    upload/client/index.htm

  • Size

    1B

  • MD5

    7215ee9c7d9dc229d2921a40e899ec5f

  • SHA1

    b858cb282617fb0956d960215c8e84d1ccf909c6

  • SHA256

    36a9e7f1c95b82ffb99743e0c5c4ce95d83c9a430aac59f84ef3cbfab6145068

  • SHA512

    f90ddd77e400dfe6a3fcf479b00b1ee29e7015c5bb8cd70f5f15b4886cc339275ff553fc8a053f8ddc7324f45168cffaf81f8c3ac93996f6536eef38e5e40768

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\upload\client\index.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    49fea72c1c031d05ecd13ae76a8d252f

    SHA1

    bb4c0f109ba31c74eff212bef4eb412ff84dd954

    SHA256

    bd20eee3166816d0b8bb38053a59572117fce40500bb3fbb2cee80335a2c3235

    SHA512

    d619d69e00725a5df4fc3e9c4e0b90ac3e6b133865f760d4b7c93546625e86c75b09d8c0af3815f4cc85a0f1efd0c7679c1762e0f5516b61e1ea9d37d70cd092

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6bedc965335ca7a935fe974169557af0

    SHA1

    c35885d6a3ef47f3ad7b43132867285bb03b8db9

    SHA256

    063492b83f18449dcf97c77776618d4dae6f260f6e15ff36a56ba2e843aa8e7f

    SHA512

    be33471ef701c3b25e8070cf8759583bbd7cc7601d2a72ef11d22911134a2e2c8efc1383b395cbbd7270e44284d9f53112e54e43fa07a0443fa01c60b919462b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0624f855be92c0a61977aec0e87bc903

    SHA1

    4d5c03b34f43ea4c8c97e37a82e0e7aecb08e975

    SHA256

    1edd31ef0bda957fb979884b45c8684a42ad72de024f1cf83872d42bd3a367dd

    SHA512

    7107975572e2adebe0be61b251c93df0359169ad9c90ab96100431a0868c06c20097dc9839ed8d0120686c3b10cb802922846ca574d57aa5223b15da20d0660c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7c880a545617da419696ee30ed56b46e

    SHA1

    e3008b4011b5023aa771d45d033a2787d3468ab3

    SHA256

    e538e1c418fe81f273bc23248dff7b5c37a8ff97d8661e0cf67630eef015743e

    SHA512

    5f3af3aff3803e161f4b51dfd76cba61c2fe08a3d4915664079e86ceb6cb9442cf32c414a13bd0855d5ebfd199a1e319af6ccab1add91c15e3f612b6217a5a7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    44e09484e5df29e0cf0e27446fe2966e

    SHA1

    4d8ab1b8b842f8d8af1ca45f0c70b1abc23d5ed3

    SHA256

    5453f4f54cb788877c0807a117eac3c7be00f8f7dbdbaf2cf91ad4898ae00827

    SHA512

    42a3dd8d69c68073a05ab08cb21580c4f0fa5a1103960856d653910b55dae0322de6813cdc896940275a0c6eb9be65d26ae94cd6aa06c49f1cb83bf807dc7ee2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    834038cf56d05c0ff2e45d1a1cf752ca

    SHA1

    1d6b26be071aeb7e64959b5268cc3b436516190c

    SHA256

    e8a8384f6859bf000ce6a3fb8bf75fdfa9c2a43dfbcde61811274fda51bcd2b7

    SHA512

    6d990a74fb979ab118bd7c3f80c5bdcbe103bcb1c4dcc74db5aa3de3bd5eefe1038845bc372d12fc985be7a1cb73185ddba5b1f00dcb1befb2460e551351e785

  • C:\Users\Admin\AppData\Local\Temp\CabEB0B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarEC29.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06