Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 03:15

General

  • Target

    0cab8488fcafc68352f454b1be4f882b.html

  • Size

    26KB

  • MD5

    0cab8488fcafc68352f454b1be4f882b

  • SHA1

    fe017a1c6ed720bfafac9965e6c05cadf5626e8f

  • SHA256

    37d76409b07e025d1f165b34808e04204c7adffcf7e78c9d4d7d1a803f0aa9d6

  • SHA512

    09e4c89da592bf6a12c53040b1496861f8e774b3282c842a88c870336339d220e24b155f591ac1abb772e9cadabd390cfaff5d5b08616272a8e11860bbba9389

  • SSDEEP

    768:SjTsA0n4lTTffD6iSl5znK09CB3c8Yi9wRH:SnH04JTffD5SlZK09e3c8Yi9wRH

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0cab8488fcafc68352f454b1be4f882b.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2660

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          457c2cf7d22913931155c62e144205dc

          SHA1

          6ee4f14b5f1371e7b7a7f8746f30674576cedfd0

          SHA256

          8acf728f2dfb27f63ef4648a1d2e3e799793de7a2b9f8845246c888f5f866fd0

          SHA512

          51e61c2774d8ebe36a324589767297f46ff9c7351304b789775a59e51acb3395540b2157041a4897f84be679b22bdff7e84b866bae00459b4ca3769402fcf961

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          65a78b168c8c4a532e0d6e5ce593e163

          SHA1

          567621ba0d3446001a3267680f5b87c7777660a3

          SHA256

          b162fb3f7ff9c9449f8853a8e8b1dd30636bae470f70296ffafbdf695e33aa1f

          SHA512

          6f6b5eec61d47cdfc07cbbc368a95ce3752bab100cd692d95fab8d97ff7558d7dd93344c102eaf5f7775235687d67984424a65dda2ff8a8c6d4c418e21382495

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6b9e2fae4935a2b7a6fa5bf964b872a8

          SHA1

          12f9cc28a85acb460f6cc2b08450bc81d3512572

          SHA256

          2817bdaf2a1926b489ce515abeb160a61df1204ff478fab6b02c05ad873ee1ab

          SHA512

          a9990d80cfd28672c415120a5605b9a678b02f4c8361f95dbdae29c42b8fa0d7a3f70dff573b544fb8644faeffefd00be161965b3f4ea4e780049c925fdc00cf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c6c5d93b708650b7358bc995e49a5d07

          SHA1

          cf633ef05bfbdacbbecca012024617705e4949e2

          SHA256

          c77782a88191bf5a47d17e5ae6c5d1fd97101d167b6720535a1b7b579f7fbda8

          SHA512

          e08ded296bc818fc04ad53ab1d56adbf37805facb5cd1b7a8be8924fc3059eb60f43a05d7d5b825d2955784f26be0581f79c12403c828f2b7be62da44b7d0d0e

        • C:\Users\Admin\AppData\Local\Temp\Cab400E.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar4040.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06