Analysis

  • max time kernel
    120s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 08:00

General

  • Target

    12dcb7dd0e246699761a4580ab74a285.html

  • Size

    534B

  • MD5

    12dcb7dd0e246699761a4580ab74a285

  • SHA1

    08fa461b7c95a6a6ce5e1547d739b7aa4ded566a

  • SHA256

    bae54ef8da50f887a0f2d8c43999dd873e692e389853cd34f09e21c74897bb70

  • SHA512

    258c1c75d5bebfc4acc3df5fcd507a93e54fb752b9059e6f196533d132e8af5a27875e3341061a28fab2d5c24014b3466a37b02d89622ebb5d360517b63b6a8e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12dcb7dd0e246699761a4580ab74a285.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    291fd4405833a3b23aefa5967d0a7b4c

    SHA1

    e39b12a2ddda92dcec54ed716f877c57bdd42163

    SHA256

    e0701e5dfdbd3cebace16d5923afbc22961b9287f9557681e039a3b06ad92f8f

    SHA512

    1fd033d43fc0ecc364176533914af93261c3c3559c2d85dd6d6329cbd6817e36a93a3dab295b43ac274fdeb64c5599247117cb99313a00d919a1a5208eea5093

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39b78af74d38bb7cc53b04f832396fc2

    SHA1

    6094b19ad558791b5bdb08f7694f9d04a4051eb6

    SHA256

    d6f6d346bb9b4aedfe3b2bc1aa3c29fe9fb587c94c62f50d4e89e6a6c2d0ba06

    SHA512

    5ca9dc3d205c93494c026cb14b4c470d1c221c64951b29af2195f4da4c7087a6c7d95ff7a8872a2bb1314fac1fe4b4845e615b1a817724207c0eb8b6c48ebeef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2db528e7b6c13f9a2bdc6209a777486c

    SHA1

    abcbd424045c7061fac302d868428ed35006c4ce

    SHA256

    cd34440fd21240f9dba47dec35e7ab04e43d602e8c4350452c661cfa7e6ddb19

    SHA512

    60260cbdd1d76e63a5b2b27e2556a6614b039b2993c3b0bea6830e5ae1b8694c4cd4a9d0c3fe94decbabb8b94bab30911dacd1e7f9f182f028ab8c6e3204dc00

  • C:\Users\Admin\AppData\Local\Temp\CabBC50.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarBC91.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06