Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 02:15

General

  • Target

    2427a92fa4a42b9b94277575a5307199.html

  • Size

    23KB

  • MD5

    2427a92fa4a42b9b94277575a5307199

  • SHA1

    a7fd65f301bb00f2291181f0b0c1429cebaabd7f

  • SHA256

    a36543a377e6c97bdc7f86134a12bdbdba5810219f3202a2fb3e91fc028c10ec

  • SHA512

    5d5990e13976582852c44af5e7b2109fedb3cb0d118cf620994b0c4464c64cab814047d1ab6d22a2ed367d3e51ca3f7b7c7a719115634e00cb630ddf818bf2f6

  • SSDEEP

    384:TI+DNUxYtesJVA7LLjZN4KnLhmNwse47LLjZN4137ua3jYzN5cSrP585qtUKjJuj:to7LLjZN4KnLE7e47LLjZN413753jYzq

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2427a92fa4a42b9b94277575a5307199.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2788

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          91b8b013f1db093358deb2408ca7eeae

          SHA1

          59b7b321ba1bd04ee3d2f68f552efa75e314ccb9

          SHA256

          4a960988b3b1ed51fa1c4ef647947e65560a43de8b2476040392b95c73673518

          SHA512

          68dd29ecfa3bdaa8ba9fe8015af834bd352ad48115d8430bc79f9c913df9bbadb24b20e27b10dae8484608fea17531908a57d9d13471d78b13a90b2785bd0516

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5eed6fd7647ba2506e261ca6d6c77f2c

          SHA1

          4debf80b363ef03b22082a13ecac736eb511ca94

          SHA256

          b50b55d1fd07f4357b8a568acc2b0c28b22461b2f78fc4bf5620ae4613551d98

          SHA512

          e24be284905d813500e042d6d30683cccf31e8003f8394627a31ef599b738ecba7385bdcb5ad45028905fd4c3f250b03db96659f60da1b9fbba80e0541c2f030

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          060df59a89f411d72c4c56f187d96b49

          SHA1

          cd458c0b8ffb4e31e0c13f9ce98de17981cc547a

          SHA256

          3472475b511dc3f0062378139a4bfc9dbede1a6bcabdb7cb2b224962fa32af81

          SHA512

          08cf8aff6ff8d4d60d0a4f4f6025b9e9fb6a2d72ab2db9dff03c54ff59aeccbf79edfdfa64dcc160a34823597dfda37a5227d514512f8ace6b583207de975113

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5a62fc896c26a311fb8a9f02aa6420db

          SHA1

          e5dfd37ba5e5496a471714c6bae84995fc06804a

          SHA256

          97c84c63587f7f860a6cc6d24c36df9efb4a0dbbdd83c4a8167a3792c7737671

          SHA512

          fc4585116af8841946971703a92a7edc0557692217543dd18b722938228033d3a8b9e74f0ba99ab6ff8b387ad8a5efbdca28ce43351268424969ffd147860844

        • C:\Users\Admin\AppData\Local\Temp\Cab6DD2.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar6F4C.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06