Analysis

  • max time kernel
    118s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 01:07

General

  • Target

    09888c839be36baae812e6dad8b13283.html

  • Size

    12KB

  • MD5

    09888c839be36baae812e6dad8b13283

  • SHA1

    98fe951f86d2572512a5c7fc11f8f34fedf3a597

  • SHA256

    9f7050fbd3d9ec530597c2e19e554ddb8b39f056266e729cbd7c8582ae967960

  • SHA512

    12e67c58ad3dfd4cf0dc25dd353a84c67ef9a94e7850ff07837cd68f2272b345440f432f6abfea63bd002f0c3a9510ab8914ee1282db44732d36e7b999329f06

  • SSDEEP

    192:g0EeI+oEjzURsm+V1U5Cm1iz9Pi7cB6eSB7Zn64OAw4LQ61+h8VQjmNcWm0mI5LU:MWU5CwE6eSB7Zn64OARLZEh0YOhBZ5LU

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09888c839be36baae812e6dad8b13283.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    292d9ddf510cc3ede0f490e05c0cac92

    SHA1

    f7b9780380404aa009bc4fbe45c25414b67ff43e

    SHA256

    1fa47917c973653f878056334c4ad4b84cc0389e82bf212066ad7eb2fd921236

    SHA512

    5b6be690d16ed068db683d961bcabfc2ea5d3e76d9b822c058a0efa60b7e08b9aaabda21ed6fdb06bac786beaf1b50dd2a86f21fe88de2d7ea0f27ba2bf19916

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01e057019bdf57afe6f9d4a717a01146

    SHA1

    8b381f455551d4746e2e3e03035d3df60b229aa5

    SHA256

    f8575d01a87d7be47bc3a1dc3b56ad82345e186eb98cbc6cda14bd19384defe7

    SHA512

    a4f24b81676e6cf8534c03d07d8fc428df31172cfd72647bc5b31072384a07aeeb25fb96b59dad67be19879f2fce4aa1bf5e05a472bf5a99b31352d53214952c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4bf1dee41e7cac4b3cb949fba869e0f1

    SHA1

    b4367eb616a735edd54517df0bdfbd26b4f44df3

    SHA256

    9544334e86a21fd34aabc61c3f617161175c493f844c4e119e868ca3e2788f5f

    SHA512

    8562c0fbf1125e549cba1508bdf7b25dcf1598dabe23329d5766e69b9b4595c9d95dffd75e5cf1d4eec76ce82397ba488a4b58edc5e4100ee1c11a688a7fe278

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a54ceb4265693bb4368a809a9bb606af

    SHA1

    dd5379ec47611c6d89fbc2b67527eb7c9196a382

    SHA256

    0e69e66a9efc62fd770647ed47c3f207039e89575e19aab9b5932043d8a6ac32

    SHA512

    57271172a204d6c9266901b312eecd69e249bf6ef71983ad4e71f7fc3288664c02a76282c0ddcbde829b15addb7c4e264581d70b01b03e6f19207c6bb07461e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eee2d3cbbbe9a6c61022d51105a4132e

    SHA1

    1f6db6679be2dc1946d874996500b9f3d61427f9

    SHA256

    658873f61685c8dcd68cdebd1a5928f1d91d6ebc3ee230f6211c9971bb103242

    SHA512

    8f86f5bfacfd1d963d32292f04306b2d8b40c81b69b04dd64f1166f2fa27f6bf275476cc4ba97cd596c366f53d7c46dcbe3256220a6c913b47e0ed99adb0399e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f3f6907d6f229e77124aa04607344bad

    SHA1

    df86aea4bea5fea99c8e219a8d72fd9da750fdea

    SHA256

    820bb9d42991eb1baf1278c809f5c026b61d65d0607d8d5f85741a4b2eafa197

    SHA512

    44fff3d80e5ee948a607a8220b986515970cd8264370e63c3f671055ee180a188cb3487b12f7fab729227c6f91c75093ec25561f53976a31b26a6021a0dccd44

  • C:\Users\Admin\AppData\Local\Temp\Cab7B89.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar7BAB.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06