Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 03:28

General

  • Target

    0cf661f69f77cbba3049ec53be3324fe.html

  • Size

    10KB

  • MD5

    0cf661f69f77cbba3049ec53be3324fe

  • SHA1

    533653ac3d0e04589352939b4fbd99576498c615

  • SHA256

    e7c17532f53a61d2f2240b0349e2793b63cf27391e4d041510c3269e41cfebe4

  • SHA512

    9ef29e489f758e5af20003513dd592130b3aca0d9f03fdb734383181eb97bd2a7b1645098c9b99f7f86c08108c78739cbc38ba93bc5adbdfc7d5a936f620870f

  • SSDEEP

    192:2VRlIsr03k18k/w1wvqVkZHBhYnZvhvcn01SZauBuLbdU8d:sRlIcuk3/gYHBhYnZvhvcn0kaguLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0cf661f69f77cbba3049ec53be3324fe.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d63e9efc0e416574a3733a2b90149f1c

    SHA1

    54cffba75689604468cdee95bf757a364bb32030

    SHA256

    ec66ac3e9575fc8886475a6488209b97da583dfd61d004a7d68e9f821d01170f

    SHA512

    2cabbd28019c2c484e59784194ced08f0a7f16b17e739e53090267639d50a54f09e253eeed94a206d870687fb30182bc080677d13b6296648d936f7388bfa69f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b3eed61dbd6eff77e0372c1dbe64bce3

    SHA1

    b647be4c9b8fc1f94505ab5a2b2eaf9734b29717

    SHA256

    3a82cc05d3d6df382b9c996d986e9bfba6b87ef00ec4d0e8ba84a696b4afd5c3

    SHA512

    8035f9e41ce1efddf29eeb4a17dd7ef668afd7e0ba07f0a0a6e396e8f2f7d3f1b0f4e77ff876b65b5bd4a8e41e4106b98a7f84922e1c887de113e6263c6823a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1a4591c247db6aa69d6457529b9eb947

    SHA1

    2147b4bed14e6e187c74f8d23c8b0a0d4f10ae7d

    SHA256

    8bbef2490692b75c97fff63818aa5139d1e7e3700c5db14348d100ec4b5562f5

    SHA512

    2579e152b5a8283805c0d33ae3d47a88a672a50e0532b6034d0c990b952f8f17d74b1d4379a9d706de8839149dea53146475404e933d6f6b26e53273781a77cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e4f276a2e84c2d19764bf75e3f030393

    SHA1

    8c26e71faa85a81e52a97527b3496f0af5b56683

    SHA256

    ca207fc87213a2d42b6f7e42ec57728c72c765a6f5198105b75691cb1f8ddfc7

    SHA512

    0bc429b4af68810c1944a09eca6f9956fe3344dce6e574dd9178d0419131e5acf482c808ca5608290e128e4e0698837d36a6c24b76005cf4898fa248bebd4e42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed4e6bacabd54dc3cf07db292638d12f

    SHA1

    1fd2ce20bfd715b3b1957642e8bececf67f5f8f4

    SHA256

    1be53c1c6962867b0b32dce60a9c3655fd57adcc08d45d8e5b12ee4e0dea5603

    SHA512

    b875619e45627e5760568317af43ef307ae1255b1a7a91f5f47614efe15c182a2d3baa65c21c3862a1c10897e19888d85620529a89906443335935508a5ea50d

  • C:\Users\Admin\AppData\Local\Temp\Cab50AF.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar51AE.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06