Analysis

  • max time kernel
    147s
  • max time network
    174s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 11:12

General

  • Target

    16dc0c17f04c5828dcc0e39dbabf1cff.html

  • Size

    30KB

  • MD5

    16dc0c17f04c5828dcc0e39dbabf1cff

  • SHA1

    61ef199531051f8a8a36758361c8a4053e1988cc

  • SHA256

    ed1f2553b8ed44763eafb514d242f75dbd5b0db4f1b01679bf4ca44ae813a021

  • SHA512

    6fce1644ac336ee0f8706fcab5cb6575ec390eb4d9f53868d2f10566892ae8ef308aaeceff0ad5b8f9a6c9cb0446e04e58626b7a2dcc34e76bcfbcf426619560

  • SSDEEP

    768:aO0lsWBS2lJTJlVVbf0VPH4p3zMb7wBCtdEES:aO0lsWBS2lJTJlVVbf0VPHW3g/wBCHEl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16dc0c17f04c5828dcc0e39dbabf1cff.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    57796367d3fac05ab46b70bba22ca985

    SHA1

    91f11764087b13db1d677993cc60a8a55cabd0db

    SHA256

    fef526dbd22bf06a446736f10aed3f129643f3d4dbb81268337183ffdbfce225

    SHA512

    f52a9b0abd3876f1d7dee4a66839e14ea850f63b336a33d907a820698379591ad979fe1ba729ff4625e06e99be703fe888a888a66fde7bc79b6e0f87897d1556

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    987eaf54d30324ad5c0b9e4e353c50a8

    SHA1

    881ad78dff46d530b03fc1ebc18f62dff0f4f85c

    SHA256

    e99bab0b0fe63c7c8e79707ecc9413100ca9777aa02ceb231d2686b9bf734073

    SHA512

    8538dca0be0d3642dc784f25febe29f863b3ea78481ea849e757497d88dd1bf6c7307428a116dbb77143136f82d8574c6906a87adc5963087d33464772066d86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    43fe16f780bf445db2537bed871b1716

    SHA1

    89be1d24a3087c61a7c3a1bc04f0451632fdf014

    SHA256

    f4e3cc93c35d76d1f8856588ed4957d80e4af55244861936fb416da2a2a85aa5

    SHA512

    19c11751185b154decfd4582bc0bffb5a9367d4d624a296418aecfe621673bd6a96f2955393f96ff45b92c49587156c8a5ee29023281546d6435ad4e58b94a2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fe6fbce755c03957ee3faba44c1bd9eb

    SHA1

    975c021843ac5a7fd4b827a143ff3c3a738115a9

    SHA256

    58ced76a8e2a02dbd949f5e718d040394856de65366d26507950ad5e72d465b7

    SHA512

    a5bf8792a792ee866549638c4b0a3f0677f6125a2e458cca17b5ffece58f5e73ba2939abfe2100422d0c9cd2164ac74a1996b05eb3954fa3b3a403cbf42b7fdd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    80ae55dd34b029c81b20178bcf9630b0

    SHA1

    d23b4f8e6c46d3916a3d0fd251785154b822c842

    SHA256

    8dcc75d858c982e2bc9f7e51dd91f438a56250fdf8b760cdca8f7563ac0a8c24

    SHA512

    9b9a7e31fcf1fe9611af95e69c51980d3c5c711bd3c5886a5fb31a26d0097e650cd7ebfee4d0fa2bb07e9c8cf6cd4c2902285b6b88166ef991e9970ec9ae0f83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ebeb6501b7a77f50d360eb952ad4083

    SHA1

    d052b97004fed05621e480bcc1c29bf3f35c1cd4

    SHA256

    dff4b198ba8e57eab937a516fba8e766c9526c40e0e17d8096a0083332ad0263

    SHA512

    12ac97357e38b4406868dccfa609f78cd81d42012b20db19003ed2f3dc8e7104fd067f4aff0f2502dcf95c43573c43218fffab6c50a6c3a334fe5ca03420a830

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e7c4501c00557e24d2da76721d7620fa

    SHA1

    3f9c93f84479bfa06c96f6581872050d23b531eb

    SHA256

    6b9e7bacac348ae5e49973955999740fcf29006af57f72544aed9f87655c5bff

    SHA512

    2ea3f1b21ef36cea870e1e30bd7279523b86f1c19d81504cd57937a609c27dce1654e9e3aa7c6493351f7f03539aa88d2ba75fe2cc028685409301018c513a03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    438f7582927ce827efbfcfbe1a2b39fc

    SHA1

    618f243186a59a8660128bf9f1b0b1a4bcfb1e41

    SHA256

    dff5bccecc8cc16ed78f7a4b361e2e95eb69d4cedf1f5aa1111e1bd85fc2a428

    SHA512

    db99eb36eadcafb22a2040b6e0a310c0f3eb18ce1804cf8b7598967c3e851131859f59541a1e9eb77a58904db2915995f0cda8cef56800fc6ff1603fedd05b6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b9c95a71efd5a170ae6fb88142bb461f

    SHA1

    4a437f51059619ee751dd31f3aa1eb8dd13ad7c0

    SHA256

    64a2d2e16ddf99db19f5ce47db66a5b01244786afe4ab5db1698e150d87eda54

    SHA512

    4bee11f3959f5070e82786c8d5bf8c9ff5f1ce330d4bc4658942ce278cd3bcf6eea5c05b887fd3230c8f6c6fd653563ba4e3460ab9140004a28e35af282372dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    284163a63d7831edd7628373a6c5e194

    SHA1

    880bd2dda9f83fb4e69c9766655bbded25f6ecc4

    SHA256

    726071f82cb9abe43f377a128be66c328c8a22ab90462e8a1b7ef48d6a21c5b3

    SHA512

    faf6b96684db45b550f1265fcb454acf2d0d8bb5016828d7ad6a6ba8e9364fc6e4185491ba5b78861577de0407ab3d224bc3710bba59b63ed4cb8a521c68fb21

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\T3T3IK1Y\www.google[1].xml

    Filesize

    91B

    MD5

    0aa9e9a691e40d00d3a6e075bfe4ab37

    SHA1

    c1adbf1ccd487179c7da01d6bbf48f6badab94a1

    SHA256

    984d3b6676a0ea2294b62ce1abe6c6228a77ec848a677e019ebc9a82dfb0a1ac

    SHA512

    f7acc9d125c0cca22d3eb62a26415bee5d317a8f7e5214daa8ea79de92ac40805ea39a9db506892d65a3d4a8431ebabcd468b6b1b50b4ae6a01ca03f45269eef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A89I98IL\widgets[1].js

    Filesize

    90KB

    MD5

    824beb891744db98ccbd3a456e59e0f7

    SHA1

    57082a005d743ec4a7f928a928bd7bd561078c7c

    SHA256

    173460e89e6a7244218badae2016f65c48a3eae9d400802273eeca18b07336f1

    SHA512

    6c19e304af16ae43504a44eb60c542526d0d8f635e4f57ab557e93999ad608be99c25354898ef4826defe63f8ba72e4d09c5eac445efbde4587534ca202958e2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E1CCB52I\f[1].txt

    Filesize

    34KB

    MD5

    d854bbb2246d993bd1f8687e79493f60

    SHA1

    28fbae93bc5e4e99a6c905fdda488be72057c307

    SHA256

    707248d75606cc53aad966797dc2cc86997d1ea1a74b1c99b9191716600c74e3

    SHA512

    ba4e7ef0a590c84310fb36ea64202cf821058eb7bd52ada1cc9fefff544b7500bf54a8ee43ce80b6cf8989071b0deaf2bf9a50c8063c192f24063f318585c3f2

  • C:\Users\Admin\AppData\Local\Temp\CabA575.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarA5A7.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06