Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 13:12

General

  • Target

    3778f163992dcfd2370219476f48ddba.html

  • Size

    11KB

  • MD5

    3778f163992dcfd2370219476f48ddba

  • SHA1

    d6a163ad51cfe3578dae818b9584acf99e40a8de

  • SHA256

    e44880b1d82dc63fc3a815acaff8cda1df0481ce12e6cba7c304ea927f498691

  • SHA512

    15bf61591c3e4bb8f335880c441aa435149c7fdbfa3af59101d60fea96a1176be4deaac7437fec648a9c7b1584566f4c7384b93c4870b069d54e716995c3ceac

  • SSDEEP

    192:2ValIsr0r57M42xWfT8oe/w1wvqa18LOXuBuLbdU8d:salIcIQ1xj/gg8LOXguLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3778f163992dcfd2370219476f48ddba.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1232 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    212ffca690f663a2d71babc35faedbd3

    SHA1

    fdf348d85a34afb1b1a157d082c2e11163930ddf

    SHA256

    4c23e2a54de73f606e253a99e0c116419144dcf735f73065d1f64f13f7c689b2

    SHA512

    e6bf2003da9712ece3744a8a18559efd778ad5ab13843120c6349962f27453a579c65bace7695c4911ec0aaee2e7044725e287ef4f49c38e4581a670ea37ade2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6a2f4394798e1cdf5d29c21cfad9f45

    SHA1

    3839140a145cc38caab84c461cfce63f9a6a7921

    SHA256

    971c72c9caceba7447577d4e8e804cbaea8a0936e2421d492e0074c9dcb55a47

    SHA512

    6084ab0349e5b47b9cb8b4e3bcde2e6f0b018d05ee0dfc84ff58274d65a0f27bd879c02975a127bf1c174eaff215d4e1e79ee7044e44925857f4c310ed1dc970

  • C:\Users\Admin\AppData\Local\Temp\Cab3F90.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5B10.tmp

    Filesize

    168KB

    MD5

    f1eaa9842e17a73d75c99853cb54e98d

    SHA1

    811eb778c00f6bf62cd28d6f6d9625ffa4041ab4

    SHA256

    cbd2ab19d21342e48d209a7297a373a5946f074fca033d6a64875c79c2d38991

    SHA512

    4cc4e42f4bd9590844221f86ad3f489f859504d5d733a2168d8aade02f29737ba6168fce69b60e00bc7620941ce4002b7ecd447bbcb12d75a38f279727b1cef3