Analysis

  • max time kernel
    145s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 07:01

General

  • Target

    2c8c229b680cc9e07b0fcdfb45eaa849.html

  • Size

    3KB

  • MD5

    2c8c229b680cc9e07b0fcdfb45eaa849

  • SHA1

    ae903fb9249171198d05905cbf047e36c09ebaf1

  • SHA256

    04bb8c7d0a32be7af132433c44b9a913f5df34e3d5bf91d77e8debf8a44bbf40

  • SHA512

    8342771558f68d9d3ec0eec6655b023e6f58ea7a462bd7dd85b8c65a42c25212333edb9dc5e1bb0512d2321a3aeadd98ed88e6464c97743a858e0e8a763851c3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c8c229b680cc9e07b0fcdfb45eaa849.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5917f75cb1ffbfe49190459f1bfddf4c

    SHA1

    efd0a72d9ad3c26a76fd253d9b8a1177dd68a6c1

    SHA256

    722bf9f3007f0119f143d9e2862607b5c7e0b2b2ab07ad02e5a80f3ce86ff01d

    SHA512

    3a2f3689e645cc98670c45d2f92e9db7bfc2ffe388fac753495f8c787f7fe03cd1b117fbf4f25142875d7c5f28706ebc91ae0f0514ba0a5990877367939d8b22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5cdd41f732c99f4b71d9f7f6ce336f39

    SHA1

    dd0b6e2d949ca9dc707496ccab6a5c46a015128f

    SHA256

    ffb47470c2f3c261f338d29e2f766d2e26e5c7ff2b18563d94f313450d1cf08a

    SHA512

    463e47d46674159688c87f44977f7ead301089c3b6fec940e22b444b70f3c1a455a1850dc500a36822ae583195cb7f23a2196b46df09a0ade923f38c5ed9a2cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aaae5198e9dde5246fdb2b50ef697edf

    SHA1

    3166424c8cf267840ecb9f2bd18c107b25892310

    SHA256

    6f0d0ccf39b08a453deb82c29c74c5803e2c2ce47cde54bbe8860881b9961065

    SHA512

    3a47263377f34c5656908f7dd94970c0594acd3f8adcf845aa82f6b62db202e9e6ba2a19c588d485abd62f8669b73b2063488a84aef11a22b13b11b0ee9e03be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    12c8fb75005f60c1814c03360879691d

    SHA1

    075823235329da5ca1cf4ac7f7135883d7bc5f30

    SHA256

    0a1d189069f7b9f77d7a8e06554175a0be4bc084a40cc0b08baee9fe79323dc3

    SHA512

    4ecc50e04e9b3ae4c363e13982505d3cdca93e7084c89cd0ed7e00e4f55162d2b65a721d68e8267a2f0a9b34f803b0a5a64a9af2d9d2228e450f6b87fa7259d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2464e8d753a5d14ac3a3e2c56287397

    SHA1

    543126190e6610eeac2c21f759881d6f04a6591d

    SHA256

    0eba4f3fea0c15f721ef15edcbd97419c860917b43fd9dc67920c9ccad5b319b

    SHA512

    06bdd8c0b02c7ca8c1723aa25fc8b58617043a64fd27410b2725e509768970d86cb35178b153645e7704f537ef84c3dc7b54f3f1f56c938b1034920eb22ead13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    de0e771d165ccb67f4fbf6174713c157

    SHA1

    1c6975be4083fbbd273cb19328e0388b2cadea8d

    SHA256

    039f0976b6a279233f07ccca243382b2d51c459a53e0711f96a4a3713a75b99d

    SHA512

    efa9620cdd8ea530e3097551d875f1daa13d7b828d5ebd84e04865c07c62980ac050d1db6c8377ae3da7b54e9f5d36b7fc03c991ba161d261e39a9d62a5746ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fd7e4067c8f770c8ec5a824b1d887eb0

    SHA1

    e7ab4f46e771946685ec785ad805a1866686c430

    SHA256

    7906fd0184816ba146c77e945d23c77502032b616d85e6d3764126dc40e86635

    SHA512

    32f71ad071493f35f1e098109abda45b2da315e432e72817a088a49c08fdc73e202669fd9768c76106241289caff08589bdf752cd5aa652e75c03eb39650863b

  • C:\Users\Admin\AppData\Local\Temp\CabA086.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarA0C8.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06