Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 12:56

General

  • Target

    36ef280e166cf821c6515cb17642f114.html

  • Size

    31KB

  • MD5

    36ef280e166cf821c6515cb17642f114

  • SHA1

    17406536ced0e50ec43c3083ba7f0b1cf67f4e22

  • SHA256

    666420b36971a416ae82435d3ad6472b9b2ae50b3a30b1494b9d2a49cb31d261

  • SHA512

    96619da69fe142da2d6c2b14d8b6d7006306c60f24626426062c2d6d02c1dfe74bec7f5b5562b791f96476cfbd0a72e4a0a128283690043c932b408376e9712a

  • SSDEEP

    384:EH2CEo5ZRM3RYufWj0eQtM4TJgWPQ5B+m1L7WXWOMqAKUSAMieaQvlVjZUvuae6:m2Jo5zM3GqFfiEmWPQf+MWdjZUvPL

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36ef280e166cf821c6515cb17642f114.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    691c56a28703f0aa9f888377e48cccfd

    SHA1

    e39288055c2ae6604d9a04d9c90ea1f69309a012

    SHA256

    5f7ee19ad22916fd200cbdb60b1ceed1ea5043b354e30aad49c82e31df522913

    SHA512

    71245e2b38f677284fc03ef3915ef1afa2f905d9cf38cc7bb83cdd82bdc3416d14641d214c2b25e4f2271fd593c15fd372761959ca5210a06642165a3db2310e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    58e98b26b966d24db06e83e52ca506bc

    SHA1

    92d01a17f0ccdcf736d1f201a5676cc69dbb34bf

    SHA256

    a18b11c66c32543fda4976aa6d6b29e361178012f1797eeddb4ec9d1bed31ae5

    SHA512

    c5e9abe63a7eb97ad2bf3229b3fbfecd89a93eb7f3342c7700860cebe97999e21b2dcc6e7ccc0003791286ff4c18b8eaa3f5b3531f636c9a60db396ab583712b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32f2ffaa4159c985352882b4cd4262eb

    SHA1

    bb1d2d262f89a0117b1a0b4f79d269ab0c5644a0

    SHA256

    b9e7946ae22b50ef79bf0d8552e66570f817495573432b29f5d11fecb6b1b460

    SHA512

    186e1f49b57c827a69086d74247f42faeecf87c6f19ccd058b0f874f0d5f4076c1a3169fac3f22ff4c34411638ee0d22755949ea2bb38f573246d21a2beec8ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2004be60508a7e89d2742603bd0156c1

    SHA1

    95f9af351493d776573187e008dd598694a772ee

    SHA256

    4b90610c2971a2c8adcf37023a04187b79f8cf2bfc26bbfc1c9ec04e02656d5a

    SHA512

    da42e4c478caffa78ab2d38cf820c36f04f64346f7f8bc7c8c6d93162874a029187fa09fe04de173f2366a578e3dde3398d92abbfaa8f98a53cccdb246295bb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9608e51b7efc5c2e69a1578a4862c8db

    SHA1

    0a4ad3cabbb117ac3b3f3a844cd3ed6e0f0d2834

    SHA256

    b954e475e6008d73aff4a4208014ba00318d69574349095469283aa0137b629b

    SHA512

    492ac57b7fb6f78a9003a7f546e8fe8b09a02b5ff5209df7a89ebb794481be832ff6f7613eebe1f2fcad17e954420dde636ae608712275be3a07984bc392cd3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a3909c55e3a3e8e43de039339d914933

    SHA1

    591d904e3c2678a290830d15e3f1b8da8d1871ba

    SHA256

    053f21b8693f3034392a947ce233f0fbdd81e026d040210341cf29012d6d6ca1

    SHA512

    80d422439a10aeb3ff9138395c12760470d148600cdae6f6283eddbe65efc17f5270a38ff42cee80dddc1ee0fae0e2d04962ade01450dc8ad82e3222ede643ce

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E25VF8N4\ken-robinson-tb[1].htm

    Filesize

    5B

    MD5

    fda44910deb1a460be4ac5d56d61d837

    SHA1

    f6d0c643351580307b2eaa6a7560e76965496bc7

    SHA256

    933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9

    SHA512

    57dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1

  • C:\Users\Admin\AppData\Local\Temp\Cab7928.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar7979.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06