Analysis

  • max time kernel
    65s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 02:00

General

  • Target

    23aaf5af5778cc13c79a4aa67741d7f5.html

  • Size

    25KB

  • MD5

    23aaf5af5778cc13c79a4aa67741d7f5

  • SHA1

    29f59520a9e66cbb0f4f388511c93ee0270441b4

  • SHA256

    2f361065094a4110705680e4bed1dadb261f991b4f105fed18339d22f8e73640

  • SHA512

    92742625cf66d7b3672b8abc8cfb145d0a8f50651c421d50732f11c91ec72b77f2eb75fa353c67ac13d969a4bbb76c283d010ceb6e83a8d868df3462369121e9

  • SSDEEP

    768:xy1R1DeCUOS1jBDHhEfh6XYammV77OfLv:xy1R1XU31jBDHhEfwXYammV77Oj

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23aaf5af5778cc13c79a4aa67741d7f5.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5982306bf9b6b8c98dc75117a08201f8

    SHA1

    255b82c55d54e23a02ae73fabec7d8e22c0c6ee1

    SHA256

    be0ef91da86cb6cb9286a79736c1aa88ff9fd93293044eae70e4f517dbb93d6c

    SHA512

    6f87b3ce9ca2252ddaa3c7340c06f448bd7fa2a22748f53e726b931ab69e111d7ff320d2e6ac71fe151f4a6006c45456bc5aab7921864c245730d33c0551f298

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a34d8594e2e5b2ea611a4574763c2244

    SHA1

    ea316fa06f627a90b1cedac347bb551bf847cd47

    SHA256

    95bf09a5e1f6a242c81f96e3b3ed3f3acfd91800f5b378c06ea946fcb38ab525

    SHA512

    13ae350d7cbab4ce90c15741e3178907b193a124d47f54a9d108a98ef4f8f96d3cc5d7a91f252c8b12937153f1b832c7f060cc46a8cd427957adea02ca1c38ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5a613420217d5244834d03532c5e1ce

    SHA1

    809bc174899ae05069f4995916c14d9e476e378a

    SHA256

    c49b506e99887d7e478b32e34ce00c43ccb62f495abbb649fe02eb78bb7ab465

    SHA512

    772c9fc35538e331e3e156b339022856b91911d9f6a74a8ca9b4a351edf0d11492b9008841992378eac00277a95cb3076bfbf9942242ab6ccd412d87878ce8f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    536dd31454b672b757909052e84ba9ec

    SHA1

    ad64db68c05c9dec04b41a6a27104b36d426e107

    SHA256

    e3cc213bc4d1d04aa084b31e26a7e7fd80adaf298d92bdd6fbdb05f9e8652b8a

    SHA512

    ecd0e3815838a3d27faa392b743d1391408cb7473d2ae656779eb42f5ceb6e5f79410d6c8b77ba5d2ff40dded1efee690eca353b5e9a4f51d153491e3e67a00c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00a69cd1a91cbc6ae35406b370d6b4a3

    SHA1

    e344d68f9e75d77eef80e9e10ce384a0f470104a

    SHA256

    3a5120945474244dee5be037971647488a18549444cc7e332a644942d9099eb2

    SHA512

    518480f6559e9d2700be96b162e465637efad2d569bbde13c4feb2fb8115fdaf0bfecafb8feb60008df3c089ed8d924ab1223a9845799811d9c00cb0754cee62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    703ee3f98f90dbebde8e6a1a7571ecad

    SHA1

    e9bddf61161c4fc14a219a087784fd062297fde6

    SHA256

    3fe3e2a6da5d82d3029359ae8e3482c72430e213a6d202fb748ce896a33c108f

    SHA512

    0709f19ebf6b018ba51ed0edd6e361963b14d91383eb0be8c63ce937a2162693b6045ac1f9734c78018c1c6939720a9d6251c59b6789d8eced74f133885e6dcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ebf53ee046d4fa3b1f3b21b542420128

    SHA1

    851ce295e79d312776c97996723314b60b776024

    SHA256

    f553e6ff8cd56ea0331cd842cabe3de10ad355187e6a6781ee71f4ebe925fac5

    SHA512

    f682e6a65d7b9911cb94b825ae9053480bdb54b7182948e0c06576181162e35c715e9bd94ba343faac6a8cff0521b3e37f7b8e8f15662aab658afd395b9d416a

  • C:\Users\Admin\AppData\Local\Temp\Cab29CF.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2A90.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06