Analysis

  • max time kernel
    140s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 02:52

General

  • Target

    2539387bd6d76fd51a274f2d9ff000fd.html

  • Size

    9KB

  • MD5

    2539387bd6d76fd51a274f2d9ff000fd

  • SHA1

    0b0a05ceaac15e74e5bf2eb3b255cbb4ef9412a8

  • SHA256

    e84e7678f62b06bdaedd555c0a72176962a50c30c1c35bc7f79bc324b5bd6268

  • SHA512

    6ee8dbd39b2abd50724ca4b8fae75b4610b7df02f6809db079d2373a1fa733aafb51190b56404a3aa026e0b3adec23194f61f6147c086dc86fc4d00b7b504d91

  • SSDEEP

    96:uzVs+ux7BH2LLY1k9o84d12ef7CSTUyGT/kPs3pUlVHcEZ7ru7f:csz7BH2AYS/HuUPHb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2539387bd6d76fd51a274f2d9ff000fd.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f2452684d8a8cad296ae991e8c56a409

    SHA1

    6e27886698d2cac79a7b5ad2f5cab4fe662e8c2d

    SHA256

    392099474847d38fd8ceae14c87bbb0f524c4f9cd2f18bf218a70b6dc372e9bb

    SHA512

    1984b82058c5275fd2d0035bf3f3bc221ae3fea39e5718280b68f9497cd12375128a9b23e73e5a853dd7c21ad868fc4f82b773d691417b8ca6fd46b1a52d7aa3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f35ca8e07012a5e0a6bd6002de957c14

    SHA1

    0010eadcdfeee6cf19c58b11800b0954b3ea59c0

    SHA256

    cc5cc365782f301db0523ad9d984e0a8e2960017691a885c11df2b34a4196264

    SHA512

    960466c3db374b009d8dde1a66245567a37b6cda92e580f9d29dcc376cc6345f00e6b53e7fd52d148ce1a746a4652a4e836fb372760cd5ec18176925851f8347

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b49bf4a69a323f87e581c340f2f87844

    SHA1

    41479cbc732d5b8ac6b0f28f650ec3902d3332ff

    SHA256

    6d153db0311b984f03846143e0b84189f47880ce99edac015e1dd84b5bee3eac

    SHA512

    e8b8e4b860f7dbf90e3bdb5b48410d53c1927b4ae09e80cb08635ee254bd9f81bded438dbb17432a811d1032852fc005df59f66b2827776d748db7f0c22178a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7a4b6fe84f4215542a53afc4129a6737

    SHA1

    caa24599f3040cccad60096ee41dcbbb512825eb

    SHA256

    fbfe9e67101be337462f04f033770f45498ca553fb017801c49e312b6a7a3110

    SHA512

    d6055f77f6aa7ad545c98efc3ff1583f91a9833e76dfca1ea386ed00d06a1839bcf2960fccd865c0706f1d3fc08ac345bce03620a02eabd8b24d5df38fa79731

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    44c7c66a4c436f4ff106f8a2c80342e5

    SHA1

    118d6891ccd09b3ac1bd2011b3cde2962e0ebd78

    SHA256

    fc0800cc14efba11ae2c7d85681923edde5c2139aa0efe6bce406c60e4bd43c8

    SHA512

    1ee036282ae572bfa63307a7f3442b99edc6591d88448d28521e43c9f4b35c7ec46454dcb0faaf772fb14c43413b9d600e17e3f5b41101306165a4501a27bd87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79d31d82b9f7b69bb50035b8fc3be584

    SHA1

    af1b6fac4f572d4419ffd5fbfbe3f0c2d8962403

    SHA256

    523027ca39107274df01f263f367dafbac6d881fa2268926bd6d58fb6b2d31f5

    SHA512

    1d243de37702dd8b46512702ef833af951ddfcfc7e3facd7640885cef5d3f911c435595a4f1a1c6bfd472294505e8e5dfc4246121e48182ae11703f55df92fae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f87b29e0a9d3e53a39a088c346f1f26

    SHA1

    fcb6c87ad5a0e4bbc3190d04afe406cdcb48d9c9

    SHA256

    8b5b09218ba88aac759ff769892e9a05cd7c839a00a7db3945955338c98e0df6

    SHA512

    9a7351715ac30f78a99572dcc28f25f43d27cecf39ee6fb075ed96269f7a8288c67bcb8c122256487980db96ad2e2458b11d26cccc26cc88700b92da38d02ac2

  • C:\Users\Admin\AppData\Local\Temp\CabEBE8.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarEC0A.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06