Analysis

  • max time kernel
    0s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 05:47

General

  • Target

    2a9427ae9643b506a27ba557f8cb5f7b.html

  • Size

    49KB

  • MD5

    2a9427ae9643b506a27ba557f8cb5f7b

  • SHA1

    0e98a34db2a0d1919711ed11c32979ff78662f66

  • SHA256

    16cef903a305a87abe4f22273e2daecf05bbd45e278f557da097c60eb2958840

  • SHA512

    a0f52bb23918e4fa4eda548ecf7379e275a6736c59873c7c3e5bb5b0452f1823f5d00a9ab499c0cc87598136ccfbdef2be2551f399766895878d4c19f18aeae2

  • SSDEEP

    1536:3WVv/VkCxeew+ee1ee/KHQAULiQ/HABQ3TfnbCZQsPo3MUpdMDUcOwBckQmH3NQt:3XOD+X3K

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a9427ae9643b506a27ba557f8cb5f7b.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:2
      2⤵
        PID:1936

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            5f08287e221b0ab8ea62e7f9caca5f3c

            SHA1

            d2339fe7ea1cd0b2093351a93d3429d76a4c94d0

            SHA256

            b7e594a8935e0ce43e3e61bad4e2c3b60257cecfef141acb29088bf439c4e001

            SHA512

            e3a5fe98b403f5bdc6c7a103386b9d15b277abe22657f79576c143b8c7a65e630827b3d9754ab9c35f783f9f0e28de3de0a3afd0b5e11362f41e621eddaaef79

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            80397cfa390bdeef40edfe70d31b8646

            SHA1

            38c8c9df1e986de37b21ac9481cddcab821f6b92

            SHA256

            2e590250b08684157ad95b175d7293140d5eea5d8846219e42cb2663755a283a

            SHA512

            6719470b6b2efdc1cdc096178e43fe047c46493b0f5382388e0bb4dd027e41cfeeba8d3db55aafddbf20a8e4062dbd45e1a3c51ebfd00b5daec9eb4bf62846e4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            c20d287261cd47ffd7da7405cb0c4798

            SHA1

            dd65c3eaca9300a951222e03d0539cffe0428b78

            SHA256

            166c384d453eb1b0d08ebbea679303b64f490983fe12b75eb1a8412e2da1c22e

            SHA512

            d8f9f22a8d6692bfd2d57339f8c5f965ede6fa985ba621974f0033c3c12ca509f7f2bb556c5abadbf7bfa7b8769e33f8423a3070c9e66632a35ae64e32941852

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            5c6f7902d05027235f1e632ab35638d1

            SHA1

            ca5a2c1e6d3031be88fc2b72a17125a9b82e652e

            SHA256

            c25e163b2cbb8e55ebd37beb7e06f2fffa5d084d0892fd8876976c5849bfaef9

            SHA512

            8a3c6dacb5d866465a51f41174ce99e292e81027dee73dbe1b41f20cb9a715fad4bfb12f30a8a81bf42448f07424fad14291b79e1b8b22aaf194f4889c63f7b0