Analysis

  • max time kernel
    148s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 13:40

General

  • Target

    3863d0dc5719db2b9f1428cb7c2a06b4.html

  • Size

    11KB

  • MD5

    3863d0dc5719db2b9f1428cb7c2a06b4

  • SHA1

    ef8bf44030c572a7bac867a9f4b8fb3e605d0c9e

  • SHA256

    dd96882ddf17068f577066179b707bc5d58e9cb63b4f829c85403d656d18ffb7

  • SHA512

    f265fb9fd96b1e8d5ac83b2720f6664362cb42112729b9e2e0088d82ded293df9c07039784cf18e97e23edf5c007b880afd2a0dc8e2f690f8a7d3c5c4689bb58

  • SSDEEP

    192:2ValIsr0r57MqxhT8i/w1wvqVkt1SZauBuLbdU8d:salIcIQqxt/g8kaguLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3863d0dc5719db2b9f1428cb7c2a06b4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cbe1f64f01a929baa63f4f321c9cec18

    SHA1

    dec746f4ae9111e745168527d8caff73ab6b4d29

    SHA256

    3ae171aa5b7efaf0d8027eaea1b26a09ac67bf30c9b9c180c8513ef74412f19f

    SHA512

    f71f124310f58c7398c33f6e76e852e009db2b0d8373ff4c4cb4ae9456f903aa63607720b872ca48ecf9b8b58ea22e24f14ed05bd4cbfa9e99c61aae9547f33c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    045a17caf0f5448a64d7c4e2637e18a1

    SHA1

    55e19bccc3925105aa194f27decc8aa543fdb966

    SHA256

    94dd7b63d0ba521adea9fd700dfa7e3731b1aa955f0d45e9aaad6bc70eb824d5

    SHA512

    33431f350766c84bad5208e82061cb05f9abc605c1c8e6c99f7e19220476c367d259a45cd5d942aee3f6e6539ebb2d6867d50733bec321cd13b77e458b1ace9d

  • C:\Users\Admin\AppData\Local\Temp\Cab5B88.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5F83.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06