Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 05:26

General

  • Target

    29f58dd38c0478daf1df83cff2815104.html

  • Size

    40KB

  • MD5

    29f58dd38c0478daf1df83cff2815104

  • SHA1

    89ce10865f60a152685f04dcac5aff575bfe0da8

  • SHA256

    30fe2a250cf5bd0343d2ee2fb75941dddf04123d42ff239526ac07be769c6d3b

  • SHA512

    1014d6d8321e04a3b577056e74d7a188d1a3efdad305de4a49864f87f1838ae028d625e9f63346c124b363b8c3c3186efea0454c8cae9a053b6d568e66a2032c

  • SSDEEP

    768:gIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZUvV:gIRIOITIwIgIiKZgNDfIwIGI5IVJ7Sqn

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29f58dd38c0478daf1df83cff2815104.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bac866566aa99753544263fe404106a0

    SHA1

    c60b7feb7c1e4f18fdfab9b7892e5003bbbd05b6

    SHA256

    4dc023561d37cf18dde914f36bad17af44d007c8a9e8909dc993ef7b06559b19

    SHA512

    3bbc99025b2dd25d5b5f25c4aa7a812f823b390eb668c62f3f5d067b87c3fc2245010097974608ca5d2e507b061799eb93789927c7be8cfd39d19dfbdd16ed82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c93924a3ae7f3b0108db685be5d4e9c0

    SHA1

    6beed27322a5e945e516d66a546b0ffd8ab5de80

    SHA256

    9db3c81b701d3681d97d7fa08edd6d6de4507afdc8667f7ec0b896433517cc10

    SHA512

    099e212054d75259c3128d5b977ea35110e11ca9a98c83a8a16a3eb03a94ca9efdd7329835232a1b8410f1efe683602a0372e891aba7ea682116d509fb77e25c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    971fa61b1c1c128022b59de936e49b0d

    SHA1

    52486a2a9674112d2253c843d3891521704552c5

    SHA256

    6c4fefd6583cab00f3c11142b53d1fcd8d73053b775bf6d86a101dee55bf7281

    SHA512

    70e9aa9dbdd6c5ff07eab409be467559955263fb774ee1d0271613b89c501be98099470a693743f0c4ed1fc03c6d8b75a273c1462a1998a503a96362f7465a79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb23c570b3a4f57fd4dffa4961f711fd

    SHA1

    d355c31800447f20c4006214ec3ea0f1478adfc3

    SHA256

    24f81e19d35c8037e3f1502471007411da6b019b1c616a8565da736596a1567e

    SHA512

    5d13966491b4e7244fc38bd3247a8e68322220bf152808b6f6fd868929f6a21fbbb70658f61bf4c9289fdb527b826cd89bb4c9a7592d6e74b28f921fa1c98bd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7336e6928b9cfbc4929f89698144faab

    SHA1

    5c4bade7aaaaac65130c0f7e19d930a3b9e38a8a

    SHA256

    6748a1a293abd6ab491cd3c4f49fc72cb5504e76e0fc48e9c7149ab3fd51e9cb

    SHA512

    5d02fb31ae0b67eb7c3bb16087fe2729999bf053704240fa34481aa55e8508d6210ea7dbaf77b0c9426adc27251c899f95303f82a688cef59fff10915aa6c4ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f1af4375bbaf41a738dd5b018fc252d4

    SHA1

    75661dd3d9d4391fb49bf6e571a5813669bbcd27

    SHA256

    f74b57d9beeca1edae53caf1fbea224923e8757264927e049a1d757f70c20f33

    SHA512

    4337f4e62bf162ba65eda5c6b7ee55c2b18850b2049144cfd100cdafbc7b5e25567a1c52f30547ffc46c935baf6634d0e1f73609f2f1d7287f3e23d9498d9126

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    93b10143ed7eaa91766345bf9e6e2d86

    SHA1

    1d41d5ef16807a6c738cabea7033ba05a17d0056

    SHA256

    86f709ec26bd9b2d95f247b98730ce42243eb33ced8a32ccde775907e2bb2178

    SHA512

    c7a46d9e8209d102e16c1a7fe7309e12f030da417734b43b4a37dfbca68219ad7405caa8250e109e04ed1ccb46d457d14f3f741d4920f749af7f123d520b5192

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    195caad8830804a62c7a7b72b965b8ad

    SHA1

    7dbe4a59697a9c56b81f5cd77397008887ff3e99

    SHA256

    8e0645c40e8c55f612e8d0cbc55ec39373a1966d38548e144d56af638966f3a6

    SHA512

    1dbca6859d06087e92c817bb0f3f9a4a34250097b653e7ac55fbfda72b5dff391ada828e4b4cbe46a732d26ba0146c7273d149abd01e823e7c4ddee276b3b65a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b4412064dd824933681fb563549e9cf4

    SHA1

    0c65d38d6b99b46d2fee783453754e6aa249e012

    SHA256

    454ea09decbbc7804aade6b5c72bf843a8cd480292c37cfc3932d274d0698d8f

    SHA512

    3e65fabb530769a063ce326a324bdb459d0af4fc0b6dc6380f38d8006d19fe3e562e522747f257734ddd8d637f88fc377029daa8974dbfe5e27868babd9acf59

  • C:\Users\Admin\AppData\Local\Temp\CabC2C4.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarC372.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06