Analysis

  • max time kernel
    239s
  • max time network
    295s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 01:30

General

  • Target

    0a202ab1748a59f1534cdcd64520eb42.html

  • Size

    47KB

  • MD5

    0a202ab1748a59f1534cdcd64520eb42

  • SHA1

    bbbf8017ada89f7d4a04fcf99b63d5ab8881541d

  • SHA256

    e2fe9c914938b652fbac128c4e3c528c29137f1f7d3f5f261f84e9cb0ded7e9b

  • SHA512

    5d596133d6b93fa290561bd55830992eccd14e7cad96dd1f3e10bb2f0069ca7395ee92e117ec80ceb5718ec3e30003e4267bd45b75d3095fc64936c4b3546058

  • SSDEEP

    768:mSHSSS9goEbTsBp0MLO1Y1wzWzT8TgkfbPn2zBHxpU:mSHSSS9goEbTsBp0MLO1Y1wzWzT8jjPp

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a202ab1748a59f1534cdcd64520eb42.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1720

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          259ad8f2b8b3184b4f9113814f2ae111

          SHA1

          261af899aaff0e8c46ce709555e92a4760848f0b

          SHA256

          12a60d4c6b72860e09c162c4401d230d90a1b628185f313d95382da1018d84f2

          SHA512

          e0cc354314a60598ceadcdf1379b66d2ee426db385e37c2e9e440d1235d80bd728faa878363300a46bee8e403f93de9f34af57d634cdd33dfa656c7af8a26374

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          1e6b2f10c2407fa51f1dec0ec675a27d

          SHA1

          1ffeba17b4c1d452f6f989e74a890591030ffa82

          SHA256

          df9f5813e8826d16e400421a5f55b9dd057a31e6f0c41bc57a3037688d07322b

          SHA512

          5e7dbf3e73d578a917488e978c258d770f36af4da338c8e8db1fbc0440c272ace64a27b8b01b27edeeb1d2413f887ecff0cddc86de5f3fb6981a133e73e2497f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b00b2c6b54ee3270bbc6aa2b7966761c

          SHA1

          6e8d5adf1334d6d59d3a6db9b6470c62f5c1c835

          SHA256

          50f6457bb325dd71f9f3977cedb612d720611315be9720399d1740cf9dec2821

          SHA512

          6de71add6358e9fbb797456db37569d92f92807b087c649d0ff0971320ac5f54bce3d9b0d9f4381285f89c37aaa32dba37e9618d4e25d1b36912ba41b49fd76b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          82afb18c1cd2d891e63b5c1e657379eb

          SHA1

          3f508fc669856ecb773d35b71a7d87607c57a66c

          SHA256

          197db45381be9a789a489b59c81e74b53b106316a67c85bdc26fe83a3eaf061e

          SHA512

          df17f88d4f83a9e35368b2aa0a676ba0aa4b9e54a737f131eeb9f1bab631d20ee1431c0452b612eb56124585c865e8f8f6588262dff8b301187451d1132715a7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b7d111ae19d7ae5f2c91f798404681fa

          SHA1

          b5b6ce0d2eb36dfa5751334977401c90b7671d0d

          SHA256

          c68ce1b2fe424270ba28c09326a252a1b9446d4d56794ed9442206a87e8e0e38

          SHA512

          ca02054da0a58e45b41dbb0e6106c638c86246465722c1c3cfe5bce48c72ff9d6809c9e5f813f80dad7012ed64d8ccfbc86481c9d88fa6c0122fbb45935dd2db

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1YVWL6AI\getonline[1].htm

          Filesize

          36B

          MD5

          64b61f312cf8dce4fb28eb751b01ca03

          SHA1

          a2c70e8bc138120ea35886135afc3b458bc9f38a

          SHA256

          7efe917132dd8733c47958b585f640115b23ece525dd4acb041de089cd6ecdf9

          SHA512

          7dcd4544c7d88afc8e369e30d05d882fb829671679bb0ca9f5bfd19d1a3293ec8897c64e2d73fbfbe723294945dc6b1b27b352ec932fddd35cfc91f845ea2402

        • C:\Users\Admin\AppData\Local\Temp\CabBE52.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\TarBE84.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06