Analysis

  • max time kernel
    118s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 07:47

General

  • Target

    128a4343d3b86492f615d108cd6af147.html

  • Size

    41KB

  • MD5

    128a4343d3b86492f615d108cd6af147

  • SHA1

    7ef37a6ea450973b8f93bcc0f27967b1700aed7e

  • SHA256

    516f494c08efe2caa64a8371123dc1404bc2bbc274e6191dad8c4cd637c87aa9

  • SHA512

    15f80b06e6dcf3ff4bed0b8215eb68ce04844c97e128c03b58dafcedb012ed8b8b5b5d6a06a03254a065e6d8d99e1c3c559cd5f37e04e4278504aaa72defaf5a

  • SSDEEP

    768:5pUg0h06tVPS0XLyOW/wtP5B/pJvyAfByAQjhMkYt+IhW:5pUg0h063PS0fWItP5B/pJvyAfByAQ3R

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\128a4343d3b86492f615d108cd6af147.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    37f25726c71a995b1d4fe65946f39bbf

    SHA1

    66b7222c6eaf64471ed311e666117b77fe1b29e8

    SHA256

    b4b6591184f42d28ccb04a350ad0ac422569fa85359cb862c05f558c322b24fe

    SHA512

    f1d997cd1c7904bb1e0175b6945b527fd6bff0671ea4a35a89abc5c3a849398b7e42b3f33587d09af44faf44283f66dbe9f2452caf2eb741dc834ee3ec255bf9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92b6f4c50f3276560dcfd0c5345b5936

    SHA1

    488de3c4c6e959949ae6a61d3c3c4cb0f66b2e44

    SHA256

    6260d1f4cdd8cbd2c915933f6529913cfb3777f4291302a33c0d5c2f6ffd356e

    SHA512

    ad710c3c8254eba33fabd8b2d6b7015a919c659cd80be6980e8281253ffbcf7d04d4d367fb193c7dfb47c07916bb29a866661ab7df96c64291269bc650549039

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    96e9fdb8c4c230c4ca93063584555adf

    SHA1

    f97cc69a332f7ed85b29736d805f758d807a63df

    SHA256

    8beb2a4a8c818848c71dff20b335c429b3018e2bdbe9f1d70c22c35b4243823d

    SHA512

    7235cc42604f8533896fc129bd46d1c0726a0802ece87cd3aef0d03c01bb440eddb4f2e655a543c13aa7147db294ebea22a26d187521f7c23884280a7c33a040