Analysis

  • max time kernel
    164s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 06:09

General

  • Target

    2b3f918640df78e6269ce192737b90cf.html

  • Size

    117KB

  • MD5

    2b3f918640df78e6269ce192737b90cf

  • SHA1

    34935f6b117ee312ebe1a3a341ce1f558677839b

  • SHA256

    d7c080b124bf1f567f820e1c7be93d3757cc789f18d206b3aa96f4e0b31606d5

  • SHA512

    839edf38faff374bd49ceaf811b3eef298924be1472eb16cece22182dfa00986436f0b13ac8a58d1bbfab06d7f7ed8628b7d61b7724ac867030026bc1c265878

  • SSDEEP

    3072:j/dpt5x6eCLwkuE2MUcjvG8rMw57/4bcwLxVEe:j/dpt5x6eCLwkuE2kI

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b3f918640df78e6269ce192737b90cf.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d7e5c858697cbc326048ec6892a4575f

    SHA1

    20a8108a6035cee55bcf30fc3ae8f79b0817fdd0

    SHA256

    7718b2a229b246ac31c8b659072e3a39d8be66df10e6db5d4f6de7a541df3691

    SHA512

    c505ed84577efa36247914f23e766af6c4c8c95f097d725c9a5bcb6fe7b9fd78ae339d6495e4713be90bf58d7b63875d7fac20d2f5586a55a462484a351b792a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2d70a4ba04bb88c90f290d2e1020a3d

    SHA1

    0c62e09e206b28500eb2ac2c0c689543d28cd608

    SHA256

    bd0c550040bea841e94aa909c887e34059771359125321a556b490554d2a5d55

    SHA512

    4fa42431c28dd83593289f030fee7dc43e190a6544fb1b749aa5b76f63b7da7b600e6c788b16b7a035fb24857a9f9d9a408339805a1b74bb12918c189cd80397

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    919e86f568b6b102a8c95a863bc5a767

    SHA1

    cdbd99fc0e2e2067e48d055a392a31592a8a7ee5

    SHA256

    281443a2ba5bf1fb98a89a81398939edea9c604fac5327a351af003be06d950a

    SHA512

    c08d7e3bb6dccd30d7c463ccc44660b6a4cab834e6d8af953be74f6c566b6f9bf31c933e082d2c4b0626bf0066f7303392c43c44e0315a29e5f8e4224c94c687

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    137dab07af445cf25115931ff2653ca4

    SHA1

    a75db70f1d1bd2016c31bc2b29829c11a11ae3a2

    SHA256

    29888d2deaeef9f1919e2947e208f79a9b1cf8a46548c163fd2dfdd41b38a7c9

    SHA512

    0c949a53e4313b41214d165ebfec5a78eddbf8545de98023086d2dfcc0c1201add42e5a235c5e47b4106b379284b18689a6eb42eb28efd76cb8992cdb8cdc834

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7cbf5f83349258ae1335a9e7ea3e35ac

    SHA1

    78dd8ba370f70255f0f767984c3f3df66c35997e

    SHA256

    1a41e810a8e3f69f3078282d82c6b2d47276284bd8ce65488658e7a0feb387e6

    SHA512

    f3888f93cfe05bd16f8b6311ba91b996729b54f4b0e4b1c83d7a330aefd322a633585825852294be90f829fba748b7c9a3a3c4ee5d8b9361560ae54ff42d36cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a4603213414871f37c26353af8d9306

    SHA1

    307317c7072fa9a7156772f16ca9ea897dab4389

    SHA256

    b676e51722fc28bd48b73d8af4d3d418f75438bbe33877287f080facbc81304f

    SHA512

    975e14322458e95faaf789474a912613db8d3e74843e2504e735f6eedc322917c2d115e7e405ded2ccf4805254faf4ebbc9ac340a23544b612d5f834a3061e24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cc3aa766559d7ce5cf9ebf17bd9a3a83

    SHA1

    758094bd15190c8b40083cbe41913197cf5c6df2

    SHA256

    e2e64813cf307026a33b36bec2404a9a4e8c614c025041ffeff7c12219d749f0

    SHA512

    d07d3a2c3d19520667daceee84ebccb7945ca596253de574da2aa9598e95dcb9ce4a2b89223088579edccbeb6e19d58dcebc32f0248fc5deacd017a4898fe704

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E324WJ9A\cb=gapi[2].js

    Filesize

    133KB

    MD5

    288c5ba5b7001fe841c32f690f62cc93

    SHA1

    29aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789

    SHA256

    c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52

    SHA512

    e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f