Analysis

  • max time kernel
    121s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 19:59

General

  • Target

    3aeb99cac84cdf57986662c1a1f31a98.html

  • Size

    12KB

  • MD5

    3aeb99cac84cdf57986662c1a1f31a98

  • SHA1

    de4796c4a167e5018151e87b475385690d3d9386

  • SHA256

    8e427e2246da228e2cd1b5fa3e6cf6e6242ad1eb2f04d3dd089657b3040179ab

  • SHA512

    4cbe818457a27228e86ec5d71c882c34bc01fe8f8d15c0509c383148d8aac5000c92d1d85c90ac21cb534c82614d0038c8d6ae5c1127beba15b8ff7a804c523a

  • SSDEEP

    384:xy1R1QREDBeVliOd766vU2ee7Io48gXaRuY352CPRrMO77OM0TCtxYLuZ4mXYHbq:xy1R1DeVUOk6cz+Io4SV77OQx

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3aeb99cac84cdf57986662c1a1f31a98.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1472 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    14af047906d574636a7770d78dda9862

    SHA1

    a6dca7bd6fb2eb1973cc7137744ab0621ed9fbaf

    SHA256

    ad2006d84943ad8b3ceb0ac0fe4890e39edc84e6b0de51821f4c5e9bc349326d

    SHA512

    1dca662f7914d87f5e5d943c42a3c4547f1c2b45019dafd6eb234af955c7a438b8ac3a9a06b8c2593d3f7e3cbabc59a0700e0e7f92d982caec4c7def4284e6c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32a0ea648c04830abe9302a0c92a4e36

    SHA1

    1b8bda990d2fa5c683ecbc5d863bfcf0a9318f33

    SHA256

    3adfa4b0edac3113935b3cdf5de0e06b07d1e3184f42d5a6753e6aa9f9c6ce15

    SHA512

    1a95f61252ad3a897555bc81a55a8a70da756e558b38f44584a2d23a1182ccaff45db1afb1b2b3d1e15aae6674705b10c09055200e1446bef985bff382d3f694

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a3026e8285c2b5074bb6974e6a114c9

    SHA1

    2f168044d3a0975c16bfd4f7c5b2aafb6697b07e

    SHA256

    2729d8699cad636746e2825a1a268305db0cf108284cc5b2319aac7d790b2dfd

    SHA512

    a0ecd76f3bd88378896c0aa083c050d25d97ded9055fdb2069833c2bc624f86dfd217739c6f8c59b8700e448a524b1d6186ac95a281573b06675eab4bb1a90b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    386c15e11d59102cc1afe7c09c248360

    SHA1

    8128bd57fc574151c354a6a7533ebe1837eef150

    SHA256

    de184e40d22e6b5c424d7a43443ca2bce2c94283741b4fe7661902270d420101

    SHA512

    a1231978f356365555a91b8b067c340acc04b4d26f6b7a59f24fa4e07a46cd8ca73d29cb4401d5b31db3483e2ce19269689a126c6855178db59522cbf8e7a6f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b0da9b01ea867905d5d74d2052fd0c6

    SHA1

    8f6d79f88c93c3bb326bbf72b797a03725574bbc

    SHA256

    ae93807be9fd9ca3ef62b7a5e615bea30cfaaae99bc2013712b57259521e0b7c

    SHA512

    c12fe8c4490c6650e567509d28be6ccd750f5464a90dc255aa00e3dad7689d66b706b63400b85bdd3a65bc1e3ee05e7f64b77f9b95c6ee062ee36639cb963bcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e9aae08cbfbabdfc036a5027ee2b058

    SHA1

    f6257f816c607adc4d0027b0f15fe786d83b3fe0

    SHA256

    ad11fe11dafb5c33954d9e8b03a1ede05a384e0ac050bf388ed6d5cae8ba1bb3

    SHA512

    21a0b7a8fc75bdd7c0556c8045c18cd1e79d8085d57d7c8778a80939b7f5add5644fc0459cc8e265722046d26370f3d2e297fd850d4f03b363a9690bb40e75b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67106fb9bbec9f1f429c15ef3eb2d64e

    SHA1

    9fba36961d85263d21a27c5508e82f88091967d4

    SHA256

    8a83fbbc27609701c567d53565f4d3a8b84459b0b3c34bc9540d289fcb78441d

    SHA512

    058fa509cebaa388a4e8238f0d3bb2a9e07606746d8a8ed7db19084f09e7befbc1de22c882496dd9cd6bd9c388e272b631c567bd10d7b2729bd7aeb68a58dec4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    75c9f854bbe4791619a4876b944b4ff4

    SHA1

    c8c3d2da71de1dbf79a65b542d161d9d2a0bb98a

    SHA256

    3de521659a3ada615160f69447ccde75828861475afca02509e89f98f0c88e08

    SHA512

    9ed801008bce4bfee1c97e87adf374c244352f522ce79f99aad4dfb00a034d6608263056aeda1b79e76782c0c3835bc6db548779225f021eeb452873a748b333

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5fd978ea19814ff0deb88a98c332dd88

    SHA1

    e33ce7c5d406a977aa545d69814a72225e3471b2

    SHA256

    027381b659ade04b6592dd0264f0ba68212ca8b141d55706a71657c3735533ee

    SHA512

    498ba3ac3ac326fa46998548b24d19798286dc10c5bee565edcc6a8a4abe3703d6642f2a1cd46a4c92adb6e5f7bf9c71a6976e5ac0233f668b94545f14dede73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a64e0adfc28c6023f2dcf85d721f7d5d

    SHA1

    4ed616c3a394bd76acf21cc6a8ddaba318bd7d48

    SHA256

    ea15d4d77451419a1c7b18eab740f0bfb254ede5b4b22575707fe6f25bd2b228

    SHA512

    20b9475ac16049b4258db94c4efb6b691f8151915e8ebd070d3e601a2fdceab53474556b73384eaedaa0d255ab51d2b2e6254b529e0ff09745b58cb110cd2753

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc4606f94940a5d3fce42c068130031a

    SHA1

    9c33ab3e44681956225ce42da4f1e9aac6d4ca6b

    SHA256

    afb062aaaa458ffa2f04846d6187ac5c65d3ba4cc341a1a71b14917ea335a347

    SHA512

    80a3b5f57f32b63b1330d029b4f1ed5356e1a41c1fe1905decc73f093b85a2e36fdecac9ab285c4fdbdac0aeee5069b73d9a45ed07ddfe64922c6ab5a4a29d94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81fa020607a827e2313044127c7cdb81

    SHA1

    44c6dfc85957095682850db0863d5f50a25913b2

    SHA256

    6847af267c270a24ba96ab6c03cb8b0ab1cc60790b11037a35498c0133da4a84

    SHA512

    0a0b41945c9077d3ebb9adb09e9350c9165b42343a3ba15c9d1d682859ec951159d06e1a1279d1b0f4d62e78f1fa51ed659242f9c6be789d87f86554d17b9600

  • C:\Users\Admin\AppData\Local\Temp\CabD6C2.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarD781.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06