Analysis

  • max time kernel
    0s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 05:05

General

  • Target

    294ba165f913d4bcb034ebd23e6ef3f6.html

  • Size

    57KB

  • MD5

    294ba165f913d4bcb034ebd23e6ef3f6

  • SHA1

    044f8f1f61e8e6cc9fa80dc3387e20a78e27eaad

  • SHA256

    dc7e24a0de8b2f5c279f4a0c7c544ca1d80ac7f0971368d0be93b1cd813d1afe

  • SHA512

    d75c33b02cc5d88253c1c20ffeea8413b4785dabc70ab83d49d7075824e643c9737f8435faef1c9d7012b6695a8edf230f8055e53ed326c975e9ede3b4be301a

  • SSDEEP

    1536:1b9FX+Jugmsx8a32BRNWxdsWEz4Ccy3TG1S5L:99FX+Jugv+a3KNWxSL

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\294ba165f913d4bcb034ebd23e6ef3f6.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c83f4a8616ddb00b41736caa290d0ec0

    SHA1

    fbb477951fa8d41554e87a30ca2445f1bfaf4694

    SHA256

    c72296b71a4ba1f16bf688cc34c73c7fbabca3856a719a871c4a93340882a034

    SHA512

    8224877a94b17fb6e66781ac9dc8a4b26773ecdc73b3ad00daf0dc611d31fe17ceea48fcab41dfb5c8b8466f02f6a6994b11ccde5e471d44f3fd46b548b1a856

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    339ae242b6c46c1cb3e11c3bb23fc121

    SHA1

    560dce9ab22fae8dbfcc88f93846f01ec019b65b

    SHA256

    f2f5c8e2a07864cbb53e00c83a32b8f3cdbf30437f1c6afef75462d35ed48186

    SHA512

    0264d8d5b97a70abfcde4678fa58a25d87545cf287f68a180dedf4137a92610c5e7b1bf24e1b6b636fca0029420129b2fea53782416a74a0c3061ece41230bec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    50c23e47d23db56480e6c15944eca06a

    SHA1

    961e00c7fb193eee53c4f48907fbc5594e955d92

    SHA256

    feaf68b317ad2b2dc4641d17924b666f90f7c14953cda2a86d9a04fa51fe996f

    SHA512

    b1f8ec2e7d403b1fa6da382501f0f7172dc737c9c437777775eb205a78d5a3939a2f8e35ce3dc0e94b64c9f75a2cffcf6d619b4b8230a2690b236745f8cc6272