Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 02:38

General

  • Target

    24c27d86942fa53d0e671741bf467921.html

  • Size

    19KB

  • MD5

    24c27d86942fa53d0e671741bf467921

  • SHA1

    b92d2eaa6a8dd53658854048382742ac346d8948

  • SHA256

    13c7f84d51c791b826d0d5da0bf307766ce64bc49eb962c68a80beafff64a041

  • SHA512

    1407bfce5e1d82ad699ff334d9cedab694c66ec3d85f223515f35d7e76f0c1f27609601aa235722f245544551b058cad19530e2edd63a7ff53691be5248d2d4c

  • SSDEEP

    192:SIGJ/4qgdPf4ZKtln1l2B/scH/2+YnP3Ok:SIQ/Udn40tpYH/CP3Ok

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24c27d86942fa53d0e671741bf467921.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a9940cf9df6d109338da8e0edc0d6970

    SHA1

    3664867b2ce21453fe78ad7b70e29b2fd48f540a

    SHA256

    128383e174cb0bb932dec30db114a0977689303addae0377065f2ebfcb3f0453

    SHA512

    58d55e4dbb8d4c44b004c5a25840c79c47ad633d055cfbd08939f1b7270c4c9d5a3fff093e95a62016a1b0ab037b4d0643a573c39d154fbe801ffafbe9429611

  • C:\Users\Admin\AppData\Local\Temp\Cab8FC1.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9072.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06