Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 04:29

General

  • Target

    web/accheader.htm

  • Size

    201B

  • MD5

    bd9a363fe33d131460388b98a52f6178

  • SHA1

    e1c15c54f895446bf9a7d6792b9204acacc904c5

  • SHA256

    81b5fd8247b4e5649989b420a7f83fe307c58d9df12e2bc8c7b2bbf827e38fa8

  • SHA512

    27a353b988b71cc1f4ef7c724a42e7feddb09ed5823c143bd510c6ca23f7b85310f50ed6f9d69391e5981653c4826f1efb121876c25930728d85d713219b18bc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\web\accheader.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf33ec1f88d9d20870f481a6968f86cd

    SHA1

    aa400a2497bc0046dcf36ac62cefef249b069b9d

    SHA256

    9141141ac1bf5ee7392aa48bc46b8dddb497db71cc38a0a8d9d47339f5650b37

    SHA512

    cf02df4d45666541f25d88d29b05f4740457c4078e32fe95e3b1145fa4d1ff4730e9abc177de43aa9679fbb97acc3c14da3336d905b5be6819d9479cb51b9edd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    66373b0a40bb59a5e64981c219dc2276

    SHA1

    102528ae3f6c8e7624a1b99c51658bd98df25fb4

    SHA256

    4e15831cab75157f236b5b486dd66fd44842491560b6338cde5e9b1d78a3a553

    SHA512

    949c902b72691523e0b58fb64ac74580d870ea353000353a5b31e397368f29b371af8bcd54f56bb111950a473136d01172d81b7a510507f3304669da4b7a5ae9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c2d115d7ec23dff2dd56934f5679d01

    SHA1

    31f2ccf261c292511f2ad52e5023ae646c9032f5

    SHA256

    c5c14fa1fa32f6da4a96ec3fc874b45ff2233fd232d0e7a80180020f512a22ff

    SHA512

    0ac81c16fe6d14406cc869ab1bdc1ff4bc75d0f4f63c56fb272b134f72e0b7f4e75daf292c2f9a68f70d96da28cda470f1c39257ab4c0780ad2444b692ea3bde

  • C:\Users\Admin\AppData\Local\Temp\Cab282B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar29C5.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06