Analysis

  • max time kernel
    138s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 14:27

General

  • Target

    39ceee99c1ddbc40a3e53b91a654da02.html

  • Size

    6KB

  • MD5

    39ceee99c1ddbc40a3e53b91a654da02

  • SHA1

    a3e00950e72c9964673af4c306dafde91b5cc246

  • SHA256

    e156007b47ba7827802cab4f764e5391978552084d9fb97b746522b641effdf3

  • SHA512

    6fdcb0485e61f1120de4bbf6ac11eae8fe7640a415a557f8a43253bb954eb112dd85fbeaa20bf57f008b4e1572db7ca1164c3ed2ec40b35c043c673856ab16a4

  • SSDEEP

    96:uzVs+ux7JQtLLY1k9o84d12ef7CSTU6ZcEZ7ru7f:csz7JQtAYS/Jb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39ceee99c1ddbc40a3e53b91a654da02.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e0736739d2e060df02fc7702d91c48f8

    SHA1

    646d11b7674628d206a233765a906b7aca5cf708

    SHA256

    cf08c9cd15854154c37644451bafffa1845391da1b5f0919cfc69a8562ebd999

    SHA512

    af78ab48eab7b73c7619803d3a48fa7cfe1ac97a4176d01f02c12aad6d472c935014caee3a0178ecc911afc94c5d8f6f559520d8656dec9ac7051d3840cff024

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7006af7ba8553f016ef1cd321b47623c

    SHA1

    b080a2de5bef8d0c4ff9a3e6574fe001131af82a

    SHA256

    c2cd563ddc6526beb6b4c119f3ac751f157f9ee2400d65fd92e90a28029553dc

    SHA512

    ebcde511cdec3417d412ee3b0baf5281136667e0fe2f51fc29b01196784688ad40c8fcfe06eeed4a880d1480829e180985ef7c18899cdd7f02c5bfdb4d4f17bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    24c17a55e5722d770523f154bc9a742a

    SHA1

    a97c3347af6cf77d94dcdd32b5ee99ca9d0259f7

    SHA256

    9abf7eebef0ac44643c976b47a3aae703d31f232c0d768ffe5b74df7cdfbd37f

    SHA512

    c3580a703ce49458047e4008cb7c4d4c50218a485f31360e2088a7d81cea428ff32cbd8362053afb8a6b13dc5026c21464051bc3d27b608ff2a56b1ce8349ca5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f03a11c229dfed12705ba3c548950d8c

    SHA1

    711bb35bd58bde3e793dff734dc5a8fea7c38fe2

    SHA256

    847694dfdcf23933e4b80ff0ff875075faf2b9833a4d6eb59665efabdcc71726

    SHA512

    d7737f9b1c5bc39c894ebb3670d7c2982b4616a5ac3a3d1069be14b58f027f5763904aded86644e1cd50478fed2db3b2b2cdf810eb94e6e67767da5cbc4832cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5c06d5ce8f457956c3d33f36cb4f6c2c

    SHA1

    3e0e2b8464f9d2e926f62289803fd32d272f54f9

    SHA256

    6fd4f2764fd2cfc8f0647107f531176add52b6035da214cddc8817995f99d0b6

    SHA512

    c580223fd6f27f8007fc7f25b4eb809133fe73a78a7a3f1aaf133394f75017817256aae8484411f1ddf73514f1348fb5914236bcc901651f48a20e064e8c522e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    893112e2078feb9c63f118d2933aed0f

    SHA1

    647bcc20ac00166d069894a7e16ae2767ba3f0b0

    SHA256

    47a41482f094ce50cf45555b56e42a5a6fcb679af6f42373c57ba02b02bbedf2

    SHA512

    dccb63ac18ef8a022e9038b731ff7e3809d7acdf50d7cd42a4327b11fdd5a67ae090b15d60ff2dc3082258c4d81c76e69e866102fa3e6889d2ddf95842252bb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19abb5ba7cb9fc79faa2fc4288a61e61

    SHA1

    5409447e85c23a832182ea182908ba928914adb7

    SHA256

    a7999802bc43f99790db8f5afc188a172801728e130232e079632a21dd24af00

    SHA512

    4e2c3b251bed1bd3ff55711fca7eeafce471ccf9b7b9a5a032f14ffe5c6d77289a9f7c016f0503b0549f005071eda15b0e5d9b59a51c674aeb6693350f4712e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97ea2e1f5ace56362420af086dc62c8b

    SHA1

    58d50483316d175cfe5147afbc955441eca068d7

    SHA256

    9d8c1f51632b6453ca58dd83689b1dece0f1ba6710efbd95ba2e60a3b5b894b0

    SHA512

    e6cd395588128f0d2323d7e6b0ba0d56930899cb0a99f7afea28dd7dc2250ec256b9010f1181bdf7df73d275ee40e4f59463836faaaf9f350108c9bd2d6c6274

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae7be81aa93e8dde800489d921d47e4b

    SHA1

    c8b07d83f3eb15e13f11875e5f6f7806af05673d

    SHA256

    4d50f5fd8a8979c8d1908e7fb4eaf57e3958bf791ade92934972ee87d2cf2348

    SHA512

    9e12bfeeedcb41a416674b63d9f0c2616bbf5eaa26d47a03220bee70c22fd7e2efe012c31930c9380170bf3ff699a7c91f1ebfcdf24c85ce564f202929cb12ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5abc1c905201fc469a762b230d7b2b15

    SHA1

    b6952a2631d1ceb4757564b8b3c3b14ab7eb55f2

    SHA256

    e258d67d51afb68c3a4b94aeaa9facba6e96b6cb1400569e3fc4ae951ba7f9d1

    SHA512

    0dad7b0566ccebd6caf8dea07001a003a544d158bb8900490c920cec8fdf00a2e816c732290fba214098579e26b6812db444dcb5274b3c89db6a00c00c49c004

  • C:\Users\Admin\AppData\Local\Temp\CabD08B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarD12A.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06