Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 13:26

General

  • Target

    37f910ea22b91f876ddc697b0c3cf8dd.html

  • Size

    3.5MB

  • MD5

    37f910ea22b91f876ddc697b0c3cf8dd

  • SHA1

    de1203a4648508214a653da9b93a94a58a377926

  • SHA256

    35ee09a6c0058ef951f43c3fa1bafb622ea6f28b653decf31ce0489d0c778d24

  • SHA512

    c104ec262d7345d5259f3ecf075c2a334c6205f52bac5765b255694b54fa357155615f6ea0d91552fb6ebae7e3b07a2ffb7fcd7de0def939defebeeb907db501

  • SSDEEP

    12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NS3:jvpjte4tT643

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37f910ea22b91f876ddc697b0c3cf8dd.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a8eb00974199cf065e4b7731ed71b8b7

    SHA1

    33e312ecb3090f7ed4de362222674e462dace4be

    SHA256

    3a1ed265f33defdb7a1c5e6be1cfd92499ef9f828965b68a486d0b284111d30f

    SHA512

    dfabe23a57a051274cbb15bf735daf1571e8c7574d52424839bc9cce8bdd619c6e20cba28afc2af033b38157b8deec18ad3e8c12eb6240e707a9dc732008555f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    33fd5f822cf80dab07e7f941bbfd8c8c

    SHA1

    c9973dfe94e7db324bd6a64b61d796a35a62fb1f

    SHA256

    02bceaeebc0ead1f3f7fcf783fd32859c63c37ab31bfae73e085b4571c862466

    SHA512

    2c573443391f2ab639840955c62a22cab8bcb7f82ac636151226366a727532b090b497ea64d0e28d1ab9c66100103055bb24fcc1337cc29ce23e648f68529f1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c17931a2eabd0aa5f597bb94b4a80dc8

    SHA1

    13b594fec76ca88d2449529603298a0708a17981

    SHA256

    d838a2046b49a5fcb3e8fa58c24a13cce52d0d0d72be0de0bbef5d5fb387777b

    SHA512

    802d9f0dbaf2af019a12daa631a960568aac9838c8ec906edab0dabe80c8b474a51c483fc2e92333293263cc422089fe6e7c42e61c6045ca907779df034cd56c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ec59bd8f41ec91e7f57bfcd1a93f668

    SHA1

    879c2f9778c85b9b7a9e58faa73003ba5f479493

    SHA256

    3187a372aa104f4f3148bf28dac909ca4141f08263b76080f578abad4bb3f58e

    SHA512

    0b2747b606b439bdd0a9384615bfd0e1993af084e31cda2ae62e4bcd7d542a059719388375fc09707385e345592b8dfad1c1df9649e037f120f7d3513077781e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0dfdad43e4d6aeb70899574103ea5121

    SHA1

    4f8e5aeec80bab234d0d406ccb05a40b8dae0cf0

    SHA256

    735a7e6c73cc1b07e09a45bc2dd72635b97258c91d527392958b9e49de850bb9

    SHA512

    841e01e3615ad09f4af1074478094c9145cf69a99311b39eb64cbc4d54f196b72c0247a4573bf4db03eb3650178d6d0de49b546e2fb6c55b5645ded934b5e15f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fcb650515559532ac88e2a3a8185ba72

    SHA1

    c418345291f2e2eca8397fc111fb5c4cf9dba99f

    SHA256

    a4eb4cfb3bead878982eced1481e2e19924ff44859dab634f745497d332ef562

    SHA512

    5dbf9ab24e12461ce88418789c2c3c78456e07e33d2bb2882f23137fa453d3d02a0c3d0536c320fea3a07026c17bf89862d981215acea949b5416942734ec0c9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JIH1AB02\jquery.min[1].js

    Filesize

    83KB

    MD5

    2f6b11a7e914718e0290410e85366fe9

    SHA1

    69bb69e25ca7d5ef0935317584e6153f3fd9a88c

    SHA256

    05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

    SHA512

    0d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db

  • C:\Users\Admin\AppData\Local\Temp\Cab1A85.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2532.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06