Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 03:05

General

  • Target

    25abeca906105fd39b12802fb1ac3c9a.html

  • Size

    34KB

  • MD5

    25abeca906105fd39b12802fb1ac3c9a

  • SHA1

    2718b8a9b3e84310793d8755dc6cae1b667dd333

  • SHA256

    872692a2cce0bb3ee02ea7fe49857b4864fe5cba61d14904015ac0948f458617

  • SHA512

    5188515da2b285b924ee3bd26f67e04719c0c71f8ed57da4e76c25e06033a02c3929c4f0ffa837891dd28a69f157bb6f04c2aa11037e6fddc158c4a98e9ea7ae

  • SSDEEP

    192:uWHtFGGlYlY8YuYbYpYtb5nyK6Nh5l5DbZd0xjpynQjxn5Q/k+nQieQhNnEFtnQd:ZQ/89ksQpY4tHp/dz6LNmOE

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25abeca906105fd39b12802fb1ac3c9a.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    04244559b069efa828986dcd4131d003

    SHA1

    30b4581779977421ed083b1020661e7d126e1b62

    SHA256

    58d2114329b4b4defc44ba389f05356869f5f7b69da1c7af6c554a8eaeabc6ba

    SHA512

    085e305801e2155eb4cc6ebd994a01c9859bb49b4d46ad92a887071723c27cd92137cef7822b0f2c86a09f96543a5bdaf24cbd942f42f12ba3556b9480d267b0

  • C:\Users\Admin\AppData\Local\Temp\Cab780.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar939.tmp

    Filesize

    49KB

    MD5

    0f2a21bfda70772a8f795e0251e344c6

    SHA1

    695aace7a519f7ac5c6723a899f472de553a83d7

    SHA256

    b0c5c6a9ec188c553d2f975e0b45feb3c817ed49e7987dfeece67810166fbe1c

    SHA512

    88bbe20986af41cbde9c51285d256032e4e041bdba8cb39a000cb5e95fb4f75123a516c0231ede6199f4300306379b3409dc5e445cdc792b0ed820f907ae3cda