Analysis

  • max time kernel
    0s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 00:39

General

  • Target

    2201886ff6e0b644a70dfe744ad1949c.html

  • Size

    79KB

  • MD5

    2201886ff6e0b644a70dfe744ad1949c

  • SHA1

    6dce37fe157ed82e7fa6c7d3f48218ec0a7cbde4

  • SHA256

    155fe8d98dc251f3c0a9d0261bb1c8af8678fa60948eacca178d15c410a30fa0

  • SHA512

    5763f3e273598380ab9f4a8de006885dcf3bfe033b65135b2a633f24f1a165fb5d7699d1f38c46480b5cca35d2d6376994fa6f677b2b186f2c3e15246b457b52

  • SSDEEP

    384:zWYYo35xCHMsV1oHHXfPWd7CqDVVVVhtptptptptnHcVnujEhX2E7ntVLbVjUQ2F:zp3eyHHvPWdt7SnujEhX2qVN2RH

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2201886ff6e0b644a70dfe744ad1949c.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:2
      2⤵
        PID:2820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2b39228a3eec052de8355fb963ed1dfa

      SHA1

      811ff232c0858b4a44d414148533e27b0611be9d

      SHA256

      cafdc09d2a4d4af23432f2426769cac7d1c91f376e3f23ca773e6daf9f7f7785

      SHA512

      32dcaef3c9099b41de8f4756a6f9319bc5fe1c4126342eac114da267bdd5ec08b6b05d5ff9a85baf15f528d613b72eecb235ab20ebab22b49aa8d3303a3dd413

    • C:\Users\Admin\AppData\Local\Temp\Cab97CE.tmp

      Filesize

      32KB

      MD5

      8fe278bd8eac660d0161a869da96b8d8

      SHA1

      eac6f73862d89fc8c49b5331cabe89b6a57019b1

      SHA256

      e8a6de34603eb9e91ba82f555080758e480ab044ffa9c140028706f916eb2c0a

      SHA512

      b180b8df22e421493dcc75a2caed123f7c7756295f691579ea5c426c741f80e381b4960b5cbd6b5e87547d75e44ab654d1c4704fe34b4b743a57f334bd05846c

    • C:\Users\Admin\AppData\Local\Temp\Tar9D0E.tmp

      Filesize

      30KB

      MD5

      9cb78c9652f98cc90662f909945e02d7

      SHA1

      246bd43bbc7cf53a5aeb3ebfc5353c789b55bd24

      SHA256

      0017f6d5e522d564d37a2e34be24fe91801df62d027ecb7b7bea96dc288bdf53

      SHA512

      f9ec1fdc3dd114529957da2187c460d4a65e1aa2a7d1e2cfc2bfc8a6fc705fc6fb44c9ac35602e2711f485aa665572c78722e56a3b84a959c75443f230fa07dc