Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 12:53

General

  • Target

    36d889b60472ac43a11597a5c3c53468.html

  • Size

    43KB

  • MD5

    36d889b60472ac43a11597a5c3c53468

  • SHA1

    614fc76a2341dce72dcdf8cc5b87e48d1aa41ebf

  • SHA256

    e72bf8b012f7b7e19eeb21a7f8c9663180faa93bed179d2ad08fff259f171100

  • SHA512

    c725af0c89002d2ab2ddeec55fa19cec7ea2c1189fa2e1b11ec04ead2de02fac7e16898c122596936e569a4cc8b0097f3895250ffec03aa1ebb38b3d3166e427

  • SSDEEP

    768:Zcd9QZBC7mOdMkGpC5I9nC4F30icpVMJ+o9wBwowQqqGPd:gQZBCCOdS0IxCI30ic/MJ+o9wBwowVqi

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36d889b60472ac43a11597a5c3c53468.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3036

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6975bc7acd8d682371e2f3b02f472407

          SHA1

          a3a239bc900ee9e5843ea28ba50a7f2967ab4594

          SHA256

          226cef3387f532648a3849e997e55ca80ce7c4d14976b952a5009e74371f7215

          SHA512

          c697b8550916f026a30d4ca704ff0190bd39892b5c6bfd521b609ccc3a642f97000e095b646faa5490ac8efb1fb71254b0479433a94e5e585efdfe73e039af14

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          be7a3bead926c60819085d99cb5f3e97

          SHA1

          7861fb189f85cae7576d949e2fe9a217d2d20a86

          SHA256

          e76623ec731a96c263743fbe03997838160c2a90ba74d5485f405ae5f14c6a78

          SHA512

          9cdc4da87f3430d5ee84747fd9a5e4b50c8ca2329c5d81fb4910c94e6da44f0c1e35ac901cec8135e90bc8e934e87ff61879e44b7b62d45e1c4c582f1f3560f5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5d2c75bbcb182d296040bfe88b230bc2

          SHA1

          4f1c1c8b19a472bb5d7c7e2ad15aca3b357db6ca

          SHA256

          6b0e4385741f22804a0d9efe67ede932921c71d9eb3c7a33cdf672efdbcb5db2

          SHA512

          12c8a7b6890a998e44bcaccabea8fadfa51e3d1be6976759916bbbe5fd5f4e77705e842f41c55e0b0f209091bc5f0116b9440ecbcabcd472314620e413f55aaa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          847085b498606050d9ff4349e9202b36

          SHA1

          8820cb9404b1135723511ea9796e5f7d7f1f443f

          SHA256

          7684ea6e5050f2fbad0e89742f5796598a6c25f0cd56aec2a093cab95a09dcf7

          SHA512

          af67e5c06a942dacde52daff1b95d848f36acbab1e70d1c57167bbc4a24ad3b95abe089910d30534388472a77b5f7227efd3bd3403ef7e14679aef3d3aede7a2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f9c90f89e91682b111ad1c8139b87616

          SHA1

          9853968758a9ac31bbe1e26aa4eef88659e97c3e

          SHA256

          ac86d880e2227a170a8fab51b00dc2ecfddabc1ab4f592ae924d8e0b096cc78a

          SHA512

          14de2177134ffc365ea8da6a61e57d02031764d6f46afcfb4e1c4a826a62632b50035bd155d9780c29df828684eaf4068c9703b066416ba11c061e099dd4553f

        • C:\Users\Admin\AppData\Local\Temp\Cab5295.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar5298.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06