Analysis

  • max time kernel
    145s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 22:03

General

  • Target

    1deb284f07081450b69bdd0dcb064f40.html

  • Size

    24KB

  • MD5

    1deb284f07081450b69bdd0dcb064f40

  • SHA1

    8a646c34a514d1660e057bb87262ca46d59ec426

  • SHA256

    b87bdb25518077e433f79d0c63eeab308d7ffa6580f584849c807626f52e8727

  • SHA512

    4c579c06c53b03d328a10c7369867e19ade9711e6cf9d3c06efd28a4a7b0ef16d08a3c4d9bd503d555a7eda19c00329d35873a1654d0f935e86b962090b5fccd

  • SSDEEP

    384:anA4ywQKDpZY29ztvukeKXXTuXwl/31AZLIWQQ/U4cR1LeeIYECdG55LkuxOk7gO:y1aKntWkekMq/E1k90t

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1deb284f07081450b69bdd0dcb064f40.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dfc2e2e8ed8260354aa7c5c1f6856b8e

    SHA1

    a8cf7f75c05d65cbd144d1cbdccec8bba5abeeba

    SHA256

    ba51e30d705023a3baeba5b7408ca5adc1743df1aa84778dbdf7b4a2d19addf9

    SHA512

    885e36ca41732e94dcb4952f5a3cb6ba2a27a0cc305f95de905f7736af61822921e2fa1c1b91bf9a9b8564e7722e8b7ef58356da1db14ad6d9b4dd10af69b22d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    966f57e4ae13f20bfce76083254dddea

    SHA1

    45e8f9c2dc2c24f2427866e1f39a0f138c65b7ba

    SHA256

    4f1abd41d2e5c92f31b4a75362e7b7e9f4b4080d72f3a49ac3c7f6dea5740a59

    SHA512

    888bfc7272e0dcc3c323bbf8f32ee65add6c068c7cf6610d648104d7bccf2144de52ff5c7d0d8c9528be6a685a57797146969ed9803bfd510106a4bedf7594ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53e4928e019f4b76ebca3170637a5b81

    SHA1

    e9ca36fe2326fbd3758c1668f7a55b8cc1f5349f

    SHA256

    e2b4ca2791a33f6af8ae7d9895c71d8cda51c5d2d261b1ca2bd756278959d33a

    SHA512

    d75569719718fe4a7853086817c99dd3409469082bbe070f9b3784bcd6e4afa891cd495d991d3f753a9e25198d11fd09dbb84f625f8d1b797cc87ce52f4b94b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f0a1a1b6b0cfc6b8f5a465b4d53fc7fd

    SHA1

    8d057f69b856272e384192d28fd6c84eb92a7b1b

    SHA256

    359aed8748f73201bedd0e212a449b61c1941c41f6dd0734362db6b6917496c4

    SHA512

    c5dc22e062eb5cdb7dbf3475b8dc7a7201f2ce7f2581d49812850e721ddca6a55ff135432c8efbae5741c4d1ce2978c21a5b96d94e10990f7906dfcc1f35c917

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81f9a8adb44fc7f572b2ef81e67b3f02

    SHA1

    70bba75d89eae55dd6e416cada764dbfd900860c

    SHA256

    0c389a751c8c540a69a89500897ba68b545606bdf4fffcc9cdec24476a100e76

    SHA512

    7cd27bbaa9e997baa3dd81f09979e4c50e15e0b38ebf73253a49fb990a2593e0276b76f25af5cd0086736703bd8cb7590f22adf27cd2b38c2fce181e06f8eac2

  • C:\Users\Admin\AppData\Local\Temp\Cab6319.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar681C.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06