Analysis

  • max time kernel
    137s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 19:42

General

  • Target

    0216ba877ac8b0f31b6ef6299db27b36.html

  • Size

    12KB

  • MD5

    0216ba877ac8b0f31b6ef6299db27b36

  • SHA1

    677699c7e1b085a1d6562728ae6241fb70e61054

  • SHA256

    993435e157bc184173fc81d823ba6ec217d263c9fce56eaf11b110cf48c9f033

  • SHA512

    a5ae2444f2eb41d8a57dab0411a1b93949d9e95f31575a81d7166c0ccb6f03df36a49cb081528bfb1c6b3a6948ab9ef7d516b853d9c5eb498fc3354440ad2eff

  • SSDEEP

    384:xy1R1QREDBeVliO36vU2ee7Io48ZX7RcY35qCPRrMO77OM0TCtxYLuZ4mXYHbw9R:xy1R1DeVUOKcz+Io4MV77Oal

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0216ba877ac8b0f31b6ef6299db27b36.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    af034efd587f5e9cfc33f2e1aa1ea2d3

    SHA1

    1725ba6114cc13e983e92de75d1c72eeca64755b

    SHA256

    49da5565cd548326dd794d889ce9e43988fee34ea6fe5fc84103b5f8eea6277a

    SHA512

    ad0104d6d2a6c894c163c715bb9f18fe9ae48b49093a21def9b98072acf8620099c3d0aee5e52bf68c61b07ea6b6c6b8935975894b3335f4d91c896f4e18465f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86d344dcadf62561cb0fabd212bd8d5b

    SHA1

    a4048e07d2255cc887a8ebd68e19cae324bb52f8

    SHA256

    68fa7fb2b2a2977e1e61602e739dbb6abd7abf407b02df56e367ab349705d51e

    SHA512

    a2860a0b5ab6e985a9e860ece99de71e33b864a5d442e24865b59b492380f4717a3b26367edfe071de060ee169d4108adbdf8583d7cb92b3e9b5466fa51fae15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c5e22795197604fd703e0b19b1e12c76

    SHA1

    95da54d53b7ed47e27a576e27ced8b9847a21dbe

    SHA256

    df9d5c149c3edc245baa98a86d8f57a4fb52ce6e1a487955d43254d6b1f496ee

    SHA512

    fbd85e0c699489a83ccf033f554430847d9be20549d726f97ab92277521d849ce93d3d5e30cfacd1f1d6f3915e9cdeadef7bd6008b621669482d2b10dbe14d4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ff8bd403222ea465c7289f89ebe6349

    SHA1

    678e615fa23bc0262937d2d921280fb98ba9c63f

    SHA256

    fa3e9e2c0a6bdd372c7d71cef3c18d02ef5e484bc2529ac25381777742ce973e

    SHA512

    159b9b5c451e416df00a555e6c3b071829c1d3267e9265469a43ae01ec5f51758a0d4f86bddc9aecfdc3183d0d717cf2660a0818167e516b0b775280e6a98197

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71548c105df1f9091685deca1d843bee

    SHA1

    4e0c6b7e28c358788018b542cfba9e41fc3aec33

    SHA256

    38f95f3fd9ba1ac981c0dd1cf02612108d8158ebeb2e9b868436814405e88f43

    SHA512

    312766cebda2a06a8ed4972c34ee636237b6db0fb3df3ede3800fa58b3d704ef5299c5eefb84f8b1c3e4b84a7f4adc78995d562df8def6eb4f487944e1a6addf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    3fba9d9297ed78490ae83682f5fc6c61

    SHA1

    80803257584fdd0db415b8a27557372fbadae9da

    SHA256

    3866b12bec2ecc847a08bdfe11281f6fc1b9d155cc8dcacf142f871348a138c0

    SHA512

    d0df6101ca3807896f57a870438d7f6eab3cdb59613628f2dcc24c8ab0498ff32b64b7e7696388008bf80167fa93690b283b06c38b2574d58f09a28ce62ed474

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Temp\Tar4502.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06