Analysis

  • max time kernel
    126s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 13:21

General

  • Target

    37c8850edc663f31c4a3fb2cfd3a12b2.html

  • Size

    189KB

  • MD5

    37c8850edc663f31c4a3fb2cfd3a12b2

  • SHA1

    ab557ed842b4876f0aac5a81e2c3f6fe87568243

  • SHA256

    76c1efb1476f66284c6e9c87b393ee6de71defc36a82dc232c3c105b26cb956c

  • SHA512

    d63f408563ac663a3c3f4391a646e1b64aa89557f7c904fa54e97f9c08f29f7b36f131bb72a31700388c7af5d524f612d94dc9bdfd8d9359a7079488f1b86de5

  • SSDEEP

    3072:BJ/qzXP7SZ80mt8zQ6RuJyk5eTI0xCJUZPeQJNZyJb5Qf99//Bqyix:BJSD+mt8z3wJyLImCOZPeQrzBqyix

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1808
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37c8850edc663f31c4a3fb2cfd3a12b2.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f1f453b0f309fd2367b4e11ef4c381b1

    SHA1

    2ef9ab0003b0bf7d82003a859d747a33762b14cd

    SHA256

    5a08b29cdca384dcb7aae7345bc514fa0fd8676e85d154c58264bd9412801273

    SHA512

    42330dad07fba088ecc5154d121350892152e4298e6492110bf3b8d4d1fc950ff88613513c739efdb9aa1fb78f6d30a1b981ba55a4dfe7572718e80433cd688b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f1339f3be4536ce3363af068810a0b7

    SHA1

    0c8c779c4b9b378bdc333284c594fe4dcc06eb23

    SHA256

    2234c9c0fbc3d578e53e3d1a960e14e83e8659e0d7eb84335bb2a215ff37f443

    SHA512

    f189110ec0a65139a38f29e61a19defa89432f9ffdc8cf77de8a42949133b741c8b89d095f861b732a51096a50a93c94fa8ad48344051279796cce81d2fc38c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bba2bc5954f54921045cb2a45f41fdea

    SHA1

    4c540f5829937115a00b6f3ea073b247d81e3669

    SHA256

    3c7b85ebb93178385e1a488b846de475cd028ce40583c7868c3824599b1338c2

    SHA512

    5800999f1da88df51287c5dba70ea818a4f5758a54474d4f8dfc2ffb2e69bc70818bd80a7f8155b3b97661cfcc3ee9c71b2679f3e4fe8d6260b242d5b1e3c80c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9da7c5d14bb154532c2aee9b9c971425

    SHA1

    c139591ff795f1234ba7d53ecbd5a0070a83fcbd

    SHA256

    67ce67e24e38f235ba8f96665acb40919aec60cef82685df4966171749db1694

    SHA512

    ed70a8455e17c898fc8fa722de348bdcb7fb664ab9409dd0a83f1132224ab56254d1307cb589bd83004cdf4b2e614a30a2a2310c8844f8da38fde38feb1b5176

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dd3ed9b96f305aa8d2ebc09e33dd5b73

    SHA1

    854ffc8f528f2c4478033e58d200e6b1fdf8378c

    SHA256

    0f5c5f4677a6c4f5ee2d41ad30c41db39ce7b094194693a03116342a22e24fe4

    SHA512

    a80374ab6fd0c6258a6931df5fe8f280c0105a4548e7371f2824370938863014ad804393d420d301d0eae1ccbce5d83d165953a5ecd38085e7a8369a3952f357

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    081c264be8a874db8378929c8d6ec2ed

    SHA1

    4cea4dd341179a1b90147e0e90d9855fdcbd40fa

    SHA256

    94dd16786a2118dd9e345797fbb82259ae9381184eaf74e0716bfb1a9ce6f259

    SHA512

    b37401a5dbb810cdb7f8203a6dc4948629f73b349a68735d2dddc7c5b6197ec736d449bd808cdbd39335d7f69d7afea52e552b3e7e5475826410f3b3282a0ac9

  • C:\Users\Admin\AppData\Local\Temp\Cab126A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar12EA.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06