Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 07:50

General

  • Target

    12997c9ca5777d2174492080578bd39c.html

  • Size

    55KB

  • MD5

    12997c9ca5777d2174492080578bd39c

  • SHA1

    4ca5d8d9776162b3e7dc4b7be241363deee746ce

  • SHA256

    34c583e2eee0eb9fe83fdb1d2d5cba6534fbdf704332396cf4d856a4b1066669

  • SHA512

    a1a2dbe951365e9e515b316a8dabb5fc34d496258d8dfa3f94ec0de188430fa8df5c572998975ef763b5c2c68240915a7e8e56b7008d2f328dd7c93728c11eb4

  • SSDEEP

    768:+rLpHvvCIoo53PInA5gowgFVcorTJMR6P+3Rn:+BHv7o+3P8A5bwgFVcs926P+N

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12997c9ca5777d2174492080578bd39c.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    f6f8b4b0f1271ad09be8ecd9728bfef6

    SHA1

    b1bab987ecdb10e752ec0ef815181277d9b7020e

    SHA256

    32e7864ad091668ffd0db8cc47535c98dff77f6bbd24c1f8d2ba676b7e2461e4

    SHA512

    d515e41e18081055caf1af288858a6a340526f3078136a1407cdd995e350295edbd61e561ebc4685bba735bec07b92727d583c46b7afea59784fb8965c66530c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2719155d5c9ca520e2472368f8e4e72a

    SHA1

    d4c8c0486202698956bbbbf40462a16a5f83c391

    SHA256

    61a8851510877122ab81b23c2f7967addb3afa286576e398cce60daec37078f7

    SHA512

    3fad148c33a1e9ab83c598d64a5499fdfd7d39bc6e150bd60cc8b0c55ce2576b0f8e81bfe23ec4b4b592b3645230cced64b85ebbb74f7440f9d3e503007475bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a9400b32f6a1a0afb8d355cf9dba7043

    SHA1

    86d2a48c63ab059ade2bedefb7122aa450dbda19

    SHA256

    d97605627d624c6854501c29fc338175546aa09a04d981b7e8bbceef0d3d000f

    SHA512

    310ca58ece8d8682eb8bc3703384b78977930a83accff0b9cc996b8f63797798cc3e6ac2cea08519e8f9b42caa1da06e4f5cc90057e1db0c904020b19ba2e25e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c64014d20df98409a4ea0ff51cf73c33

    SHA1

    11988ff8b4ad6d136f2eec793176b36bd55c102e

    SHA256

    4e1d355ff78ba78c7ecb5e958c372ca9e1732ae9dc49e31a6f48064320afa8b2

    SHA512

    d9209d86759e4cb6646cee3ab12104b3f957af224ac844e54ecdd2c965af1c43d0f2613ed04c586b2c04390aafa6d33c34d36afab72a7275f42e37795dda8024

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ad8906f5c6ebaca63eff62a32ba24b33

    SHA1

    701e6eb3df27b1416872e3a6087f63da1b5c948d

    SHA256

    a8b7ae1e3237f3ff37c7745eec77464009c9d39965687e8610379c64a6adc4be

    SHA512

    063f42cee91539a897bcc6e3ee0769ba0dc46837d5137efa0a75befdc54af8399ef535ee64baa30d34ae6d65514c5ea324607f8b511e075bb4bbfc5c7d5bd333

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fe3e5ad9497bd599008495e6d8866701

    SHA1

    7a756af58732f2d8c77d4c456502adb5be35c45a

    SHA256

    bfc40acad6f8db2b508c17b5936b7f79e001c2250210e3f63f728a501eda6993

    SHA512

    5085b886444b9245b922943ce39d1776bbffb3a135f3789bca002d0ded128be7601317d18747d98d6a299fd8bd8f6de9856605839b46a5f44fb0d6fff3c42621

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0256babe7d07db728ffcde3e21803ad6

    SHA1

    136f97b089d04cef914a989720004efa5a4fe42c

    SHA256

    c8c9c13813080504be82de4c8ff68c70307cf806fbeabe2c7ba91f160ac7a912

    SHA512

    3dc1bf5d4ec9d227f8164c71b10c31efcef71211b16b669235785a6c412004201af7c1e143b0fa1231a6c2c7dde7b0f3fdfe35332c187a4bf7e0652bb0a2e19e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c8f68b6d9255059cfcb537fd6fc4221c

    SHA1

    ea794cec2503ee11026f3e266b7802195c845d91

    SHA256

    e8f1cace2e38ad0b8e0b1fa6652784c415f6ed586e1618f3e836bca9c62b0dd1

    SHA512

    755f4b14f1ea81ac05aa47610861bfff68a39e628b26fe1ede8a09e7711454f4206f060cc96b0808f68290e3996e223ae8b2f3144b5cc6b87ab30cf9181e7256

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d27b80b08a27b06133e609c98dd21e99

    SHA1

    ed25f131bc37b9e55dd6e7a9a3d1a39a776ef5df

    SHA256

    0d39a99e67e7384188210cceb0bd754061f91e25cb9923b7f3d6830c399ec083

    SHA512

    d669aba0859ccda99cd73fb87da6ab9ab1ae3aea8533433acfb24348ccf4dc8ab3c4dd054f639bbb09c65ec3c41db9cee798598a65c54a9f321c0284980539c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    04d5fa051b9ba8ab335dd55b1441ce27

    SHA1

    2e83ef91694687f559f65b7718e4f65ca6dfc4f6

    SHA256

    8cc0eb9f9d0e63e2ac7b258727b7c3101e21ae6f5f69aee03146d9801e152d8f

    SHA512

    6287ab1a2693c3d3a5489245152b3c58480c5b8b02fef9dc20b5ed3a648f8dcfb0ec7cb2b18c98b4a15a5ad0756670e87db162b56a82fe830bb3c16a4418165d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6IJYZ6B5\cb=gapi[1].js

    Filesize

    133KB

    MD5

    288c5ba5b7001fe841c32f690f62cc93

    SHA1

    29aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789

    SHA256

    c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52

    SHA512

    e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFLWQ602\platform_gapi.iframes.style.common[1].js

    Filesize

    56KB

    MD5

    f6140cf2e81a9d5b9bc96970fe1946f6

    SHA1

    e18cb20a08d0c13d44b72e36e9560aec2187abce

    SHA256

    68cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5

    SHA512

    1f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb

  • C:\Users\Admin\AppData\Local\Temp\Cab6E1F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar72C4.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06