Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 04:30

General

  • Target

    0e846bacdab56faec2bececd280699aa.html

  • Size

    35KB

  • MD5

    0e846bacdab56faec2bececd280699aa

  • SHA1

    4fca8d01cc3d741abaa3f0a8dd1f23cb7124888a

  • SHA256

    6c6d6a48cc931fe6dcc71dbc558a3fb2d66964c70168e144317f1c633a54586d

  • SHA512

    b9c952b8fe2851e76de878403d1ddef39df419c229d59a86673833cbaa4014a47235a6f901125c350592d7498ca0f91083c162caa3541c19888b52ff041a5df9

  • SSDEEP

    192:uWt42tRTmgleBnVb5nC3akHcmj+Qpx+uy9nQjxn5Q/kpnQieoQNntW6nQOkEnt+N:PQ/MVlaCjbXJqyWWsNkvqMz3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e846bacdab56faec2bececd280699aa.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fc2749aa23282efd77cfea0056f90de9

    SHA1

    8652a38f561565e29803aa94c5d9833be4aac8c5

    SHA256

    9fe05af449758443f72ff79b65a913e20b8acca32665d5ba20d6bcea4800a3f4

    SHA512

    0d40b17ddad4579f5acb31366f5dd1c37fd0e9e036e5c534635fb032a54d4664d363e17d4b165cee99f060e8ec5e0bebf2c3af6d9704e546f6248690d8a8c371

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c0e8b8d6c56f4e8598b9a4249ca5532d

    SHA1

    e51c0bd3d34cd9a6e4990de302fab583258c5469

    SHA256

    743f062520867fd80355a9b955d40b2e7fcb77378c710e7cdca911dc7f97a7e3

    SHA512

    f0a097514929b228373ba287577f4a49e444486a31fde7107c9bff321e311f0ec68618a0ba9f75b5a2615ea10741c25634916a7379e7eb245221a40b3ffd44f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2caf5d6477c9ebcc2655d158df2666f2

    SHA1

    b445fc7a0552500c4852e571dfb5b6cff8c0ea72

    SHA256

    2bfe87c2435a67a6ac6363511586764f9a854dd1a396f847beee5ab07a9598c9

    SHA512

    5ea17488b717817dcff7fc6fcf6777137df12394723ef35650d075ec06aaf581a3a090ceeb364067bb8abcbc36bdac079545184faecb2eb86397f30b9b8e223d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fd11efa9cd308f54a552cdc0802a52c2

    SHA1

    724b1a29d4962d6f2a6c499c6d8f34f9bb5a70b4

    SHA256

    e50cac4a18297a0fd8972b89499839c29da4e625ad6798be7c73aaac08ee5627

    SHA512

    7f3f8565d6b6fd84b7d8eee0636d218f483b30ae6143cf7c058dd8ff3dc9146a80b86fec1d0a07d2ab98806c115a13cca68f23767d5622aa03144f4dad17ea2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f9fceba9cdb59b111ee933901be677a8

    SHA1

    e3be0dc7edd7194aa1a60eae1e9300b246ef1798

    SHA256

    293a16423f7718af1853513937ac445ea6899e145d3a5bb8ca7d46e307810e36

    SHA512

    7d902bf8a632cadbca9d4b667bc5e97cbebc16a2e03938cf20825abdb4b23013bbb878c28859c10b63e0489a46bdeae88b14eb522d49d5b555ad96f8ef811eae

  • C:\Users\Admin\AppData\Local\Temp\Cab6E11.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6E33.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06