Analysis

  • max time kernel
    121s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 13:52

General

  • Target

    38bf6e622690802fcd2bc3d637b7216d.html

  • Size

    3.5MB

  • MD5

    38bf6e622690802fcd2bc3d637b7216d

  • SHA1

    c6a2829d97635772861cd58382b21b865cab43d0

  • SHA256

    b455d9219e314632c23dacd5528dedd2f3e9422f1dc0e9cd4eeae902e8641c00

  • SHA512

    c88432c809f2ed211645a4ada4347850e5ccd9c430b19d20d917fd450bd227ee27d1a8f6ad6ebbdef774f5e2385fa9de72d457353abedb3cd77411cb444ae62a

  • SSDEEP

    12288:oLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NfK:ovpjte4tT6NK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38bf6e622690802fcd2bc3d637b7216d.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2264

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          68e22a71eacb928496058a5d9ff82f08

          SHA1

          446caf67bba563081a13968bb0ae8f47ffc792c2

          SHA256

          5e921b4049b2cdf308ae460af05b2badbc616768da61d14ae59e21aa5101bfcd

          SHA512

          e26d11029de1907b2e2b60376b99e0e1e07dba745212954e61c4decab995c1a5cff48a4f152851ae0e7288ba48288bda4e2c16fd55946127a1c496c248fe131a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          9b60ee560a9260c220a87beab25fff10

          SHA1

          f82f65a07aa747c51a70755eb6f5ff5bed9fcb72

          SHA256

          0929a9e9d6d143c693392a05ffe71d8b4128a59531cf1cbc3813214f2fc8854b

          SHA512

          1353ca6fcedfe49106b5a345080433eb5ca0e5b9889b96b4b635bbbc6d6c71451359a5ffc792ddc052797e23067c78d2c1ecf56a969de76baf81e378a7012183

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6abc1d475b9ff2887553ce4141d09ad5

          SHA1

          61903912be1431838c3235d87930dca03dd09e46

          SHA256

          790d3245aabb7f6367bc841cd38fe8b3b65eb54f9b99763a1d26fe8019ed5a2c

          SHA512

          efff9575b86c0098ce396ece0016e9600c621a96f24f8f04c2d0bbcfcebebaed7ec6927fcb6d64937c7ce8f6b6f06a65510dce22c2e2cef6eaee9b94bc5f8092