Analysis

  • max time kernel
    134s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 03:36

General

  • Target

    0d27b1ad848dc46b833eb7bf62a5b77b.html

  • Size

    11KB

  • MD5

    0d27b1ad848dc46b833eb7bf62a5b77b

  • SHA1

    9fd0e0b1c30e4fea06b56310851e3ac902fc41f4

  • SHA256

    e45b3b687e63d7a8d371a35177cc4660f8b09e7ae3de549a8e27a29b904af549

  • SHA512

    64f2160b18633f9750f61bd27af1825330604755125148651c02ab83f1db65f2fdbe3d4db1c6be99fb5b339a3d13f2b1f1ce7035de1cc60463704aaa40449a27

  • SSDEEP

    192:2VblIsr03Oz8k/w1wvqLkZJBv6nXvzR6R01ImvLuBuLbdU8d:sblIcuOl/guJBv6nXvzR6R0ImzguLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d27b1ad848dc46b833eb7bf62a5b77b.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    93a95369fa46dd8edaf30738302a2d33

    SHA1

    f1f6888ffb0b168a97c4ac145411494f0634af50

    SHA256

    e84226a5639f059d9a809b96ae15f1f2b1ad214af107b086dbe6ec0bd2e1c4ba

    SHA512

    66589997fe0256f1fd9fe21ef85c679497a70c97d61e785a8794b55e9748329147fa19e0a81f46c4a7db1532aabb18b8ba110ff3dcdb37300c8dcb8fa7a93882

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ab6655404f683f5eac42e3620637f356

    SHA1

    8c77e59893c74f1e61922d1f2660a83649d8274d

    SHA256

    e4adb0ed517e0ceb571ff12027f3f430003ea4249a45c0ccdda881913d7e706a

    SHA512

    1397d2cadfd2280859d11c61a4f2a97a0f19ee2a5feb40f888dc46e8aee39ac48776d571cd4177196adabaff02660ef730c9e75c53a3fa787c3e4a5383b53f80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d204c19b4ac7dbdb45f385224da1f8a0

    SHA1

    8063f78e163b128b95337f7627707a7928bb1265

    SHA256

    c7c97045de864bb846025cceffa80e5f48cbf513bbe822b39ca0638c1b09147e

    SHA512

    f732dfd37bdc8166d39e8d4ebc4909e614eaceae92024d0ad1f1fea18630b424ff7e4ff19d225c17e147265b23f0fd2790153051c957243b7351b8ef7f41d90b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6ebb3eeb64dbf892e5fccdca7ad0e329

    SHA1

    d94413bb6dbd408eaf6c192074057136c67c741d

    SHA256

    b54ca976d98c4840b6856a4e852979ef27207777fb802983d8ffd921006ddd6b

    SHA512

    c527ff1118203d9a4574b45dbce81a6fa9d66895c12045a082c3499187332f8a1fe71505384e12c49056c99aa24c8b5a90c6e6cb33cf6dd15070046e6819f504

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92669dadaeef787ac5c813651de7db69

    SHA1

    2d2a26be60d22ab6cfa2c3498e77ce7812587431

    SHA256

    3047a06bea43d0979ac9b3545d5f76d0f6ecf78c0980107c9c934f95a11bdb2e

    SHA512

    e9c3f441a24f4b4be06b74ef09af5f2b4009ae2152cbe159599a9af85ee374e953f7e953fa5a1dc252ea2b5d8306174575f95ddec92ae150c9a0b96b1baa7943

  • C:\Users\Admin\AppData\Local\Temp\CabCC27.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarCCF5.tmp

    Filesize

    99KB

    MD5

    fa178920e56586a7d673ef62ab4575c0

    SHA1

    cfd02c6a6b26f3407a1f9a91411f6f4467b1ee54

    SHA256

    777c3d087168f5f42bbd550047ecf607a3a375eb621d7e30a38e9c8803a861b9

    SHA512

    12b20ccc55780883d3b4c36366e335a8d07d9581a2684de3e1c05055b6fff4dd3e0124cc210e93f5f4306c37a163a92584047d5eb0ff5d71f04ee30c593a836f