Analysis

  • max time kernel
    133s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 08:05

General

  • Target

    12f59c121963b864bbc15eadcaf703ea.html

  • Size

    33KB

  • MD5

    12f59c121963b864bbc15eadcaf703ea

  • SHA1

    6b8754b5d6872ddd09a52b04a6de80243caebbbd

  • SHA256

    41b8412647f62f69ae57a32c1e479da5795fcfd5ae237f6f35705de139ab4493

  • SHA512

    603c938c5ce2a4c5546cd743fb34c5f4351b54ae3af39758bb2c111f91142d96b021ee11825c58c03a4b06d7beaef02f0eb28da2c2e0a0f7b8fb3040c92a57fe

  • SSDEEP

    768:SzkzcyJ/6+alm48vRkaMwI5ckbIuFcbIB3IfMcaPB4r:SzkzcyJ/6+alm4ykzwI5ckbIHbIB38M2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12f59c121963b864bbc15eadcaf703ea.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f033a4edcd5110899b319125b6e05310

    SHA1

    96aea9edd09730e6e5a01db1f569780078c37a2a

    SHA256

    7e72fff761d18999c15cd0a35bd189a8848c264b86e27a0d8221ffb8da1ff0c2

    SHA512

    0ed898c0fae5e6cf33fcde7f517193fccf3935760933439a2fe982fbce9dbbc0f8c4d8b736fdee1c6a0326d0b81b3e9d9e4c95332f207497bc816c0ead4eee71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6ed321bc0e4f477b5435b25db34ef4d7

    SHA1

    d73eb4f833f7feb52a3a65459769b62f80dbc076

    SHA256

    38e1554432984fc4456f1b85d59a122fafd10739fe815a97ea3454c5570ef01b

    SHA512

    2509346ad41248fab8a90b5783948591dc95da781cb90dbac348f26e0e9c62a6f5f4f9fb6fc56c1717cc1066d5501e818d8b09f4acfcd53eb865e1be1d023283

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb41240fe0e2671e5c0e87c7f4edc799

    SHA1

    495c1e28a9a28538cf9942a686425bd301d660a6

    SHA256

    4ad4cc2782baf474117c64d14297006d680e803ffbef7c8374015c5436e1bd43

    SHA512

    53ea4b9b23f7fb5cbf2dd8ff70d8a54928a9dbfd1f80887cd6387ae9f69f09531ef81a482319046575addb30e22dcbdd288f154baa100521f3c0fa3696334d2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52f7b004d0edff8658e679ce25057602

    SHA1

    707961e542754b1e2223dacb6dd56bf8425f114e

    SHA256

    20c97734f8febfd2a49e0d6bab3f59459d1bb9c76e91a907fceb64c8c756294e

    SHA512

    9fcac7d6d64e05053bc1a2d477eadd51f16c70871cea94a31c579e02b2ef62fbb7bd93ef7bd5b4a04d453787192a200f2003f1e5812ef4326c7a5a09f9c87c39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b1649db3aad3ac6f74aa0aa6213177fb

    SHA1

    a2d3d2a4e6e5ca147283ec5364e6c5b27a666790

    SHA256

    cc71ea64eb8f47117e99a5b1c4af306b94a73b6f3045090fdde4dc15dbd143bb

    SHA512

    3b101fffac609cf140355e1de62a900c89b035a4b54fcb21ae56dce90c2613d93b90a684bddcb77d575742c0ea21876c9b50108a87e5d94e4bf38d63504840c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d5ec120027aa6367912f3027cb2e2a6c

    SHA1

    c22652f41f12f66e4899cc8a23e69e1207b56e5d

    SHA256

    512b497921fdd7db05deabf042e452978a273937f3e954ae309ca6394311ec37

    SHA512

    1e3c338ca5c0ff8ddfadc4d5ae45cd9b0ca86e5769a8fe1fb2b50728d95deea77bba78c108c607d6c67bec5762228f6bf40c9e66cb0cc38495bc4b9a958d4c9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5608b93b1496ea733ce3bc55aa0e196e

    SHA1

    1e9be7da07ef947e1ba682c95d83602fa2a68b04

    SHA256

    23b54b7f1cbaa8754c5febc9204ae5542c100cbbbb7dcc3710b5817ec9021ad8

    SHA512

    584b5054c1523a0244157a312e0938f5e085a2cb477475b8157577f7f8d7594323193571f217c051abbf341f6876c06364c0563acd289ca7321f340af27c9655

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    49860375fdac0aa49fed63f8ec5b4988

    SHA1

    d84c12a8d4761125ebea6bc7b7e3c0a2b4f0c1ad

    SHA256

    7e4ff777bce4756af2dae3dbfcb1b3b7f3c3478b578425adb912d3c3c2f85d11

    SHA512

    26a59553e887279e1776ab1fd2c25b1a0f1033bc4ad55e0dc75cbe5ceab839f7a0cc66e72238202e06bd9af8cbe44eb282916c642ec8da2e187dc3567e30ca37

  • C:\Users\Admin\AppData\Local\Temp\Cab4E70.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4F3E.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06