Analysis

  • max time kernel
    120s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 21:57

General

  • Target

    1dc6e0aa79d242839948baee499e270f.html

  • Size

    1011B

  • MD5

    1dc6e0aa79d242839948baee499e270f

  • SHA1

    da207599fa7ba2faffd51423eddaec26cdc51ec2

  • SHA256

    15152188fadbd4c5709ca74308451e8941ac57ef703101c958a77359a2ff1215

  • SHA512

    9c1a85a5766ec1f243950318bfc602acbd6555033f41b7c62fa43f6a4e1635c739bde63e19294087d0f1c8990cafb12eb8f63126c14dd7e27bb2947a45468963

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1dc6e0aa79d242839948baee499e270f.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    61bc6dfcef72472c687b90f13e4af6a7

    SHA1

    809a2f50d384f2ccd0a63adb098d2f1d4ee52f4a

    SHA256

    3019a47c48f02d08022f62493b1114b03a65f780801d9a206c764f2cf8be4f65

    SHA512

    93960f465964cc30b3653c177989e2c33eeb2bceb586fc73889c9841230fef370b8946f6197be336b364eaa944a3c7d382eb3448e9dca3e0f5f31f79bfe2f1f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6e5ad9356eef56e0c1489900e27f38a6

    SHA1

    bbba9e4cc05ec500a35b89c11678224e33d28524

    SHA256

    1091bae804a99eef238d5b8bc3dc0c651945010b2d3140d109335fe5f9fa3aec

    SHA512

    13fdd9581a4cb938b8870383bd347eea63a43570385ca526ffd6fa72f309d68494583b94c4a71477ba5a3fad3457810600ccf681d38ed3b8d87aca434711285c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a75df29a24b514365b3d94b992c09cf0

    SHA1

    469ead0e8791e725a5f2e40050995b09839133a5

    SHA256

    ec78e3c8841e11a966844f3252d765c69e04e6d3e2b52a178bfee1ad9c42d4c9

    SHA512

    fffac3f70bb1f2eda092b3a650bf2b49b597dae6b6dcf80dc6a77111cbf5e839aba1ed2aa77138cd46e5ecc90bdccf767839ab32905b7b88b65dd4f7ea6ce0e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e4e15537a4a6c011dab0fed918eb2ed6

    SHA1

    2ecf125abae164ce6b67ee5feaedb03baba02de9

    SHA256

    43a21bd469b2c1d5deab7ec5e504a6d048fccb8b6e6e36848d269fb8741fc2ab

    SHA512

    7f72e1153d1930c507cc6f4dd4e5cccdde0f3ba311b02adb639245aadfb10d5637ff2e34fde30c30d7f0b51869561261a1fa9ce71bc211bdf949b9c4f8f0c0d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    664b88ab7261bd79c26c2f26e49dec05

    SHA1

    da1fffe793837d4952dede56da4079117eca0995

    SHA256

    0d39aaa0d72e53cc9e0fa0cc64fb6b8ed93b2699af288d45f6dd5819c13e2513

    SHA512

    6a2885c4cce4ce9510b8aa999e62a2ecfcf1b24a4e481f47ed5b7ce9ce4c3788354dcc48eb28486f191f680e6ac5bc94b59e1b8fefcf21a27a07f9ade16fe9b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eac4ae3f5ce4c53085eae438b2be41fb

    SHA1

    88b33b8dd1d5d2ba554a398415569007b36647bb

    SHA256

    ddb483c04f9e2711b5c8737fe2900ae8d1322e4e4dca61c056a4210f348b5411

    SHA512

    c237ef9402896151f9cb18a0e51453fc347c11f7fb3f9804f19c245329219545c0ec1c9c49130dd9c41fa7c6f7ac48972b67b6337ed4d5df6c8e6a727c2e2c15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b07fe67a98855c13668af3a69d3e5511

    SHA1

    90ac10f5c1ac778dda4f359f41a64231b6362c67

    SHA256

    b00fc2ade52ff3a56c2aa26415adef206a554325ee8feb3b571d57ea65fed976

    SHA512

    a925b1109e3be6a3d907a7e39728aa80e864553a77a6f63607074c99c01b257b218a50cb54c418d770fae846e548670a0c8b86ce707a2794e454fe3066638266

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bae8769fdf62f1d2f8f381198e55dcb4

    SHA1

    d8725e5a2d6ccfa4471a8f48358f04d9df4318ac

    SHA256

    21e3586996f12983d77452a909ebb22c01c6c7a1ef2ba3d6ed8fb64caaa28a0e

    SHA512

    f809deee3d77b99c0531b3e744ca1d51cfcc977c98072278cd1493ce23e1d6cb33eb674895f8c92deb174ecda56d75466892241919826ebcf4f9ce552749098b

  • C:\Users\Admin\AppData\Local\Temp\Cab91A8.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar94D6.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06