Analysis

  • max time kernel
    191s
  • max time network
    234s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 22:58

General

  • Target

    3e17f0f0035f8b175058af2b3314865a.html

  • Size

    204B

  • MD5

    3e17f0f0035f8b175058af2b3314865a

  • SHA1

    7156ab48bc38af6a3fff87ac2e725a939cce7c15

  • SHA256

    f583ffb6a8415591403af1e85747a59dd58d0e1341844f2a811ef865b81bb44d

  • SHA512

    fb2bc6bbebafb510ec267a0252f4803928c14991caef4ca9d1887b04948d23de154b3f6d7ce0ef0eef97688a376732de75873b568bf9e5e4ae2d6b02c202dae6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e17f0f0035f8b175058af2b3314865a.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    69d0245d52a5f4543f7fb5f3b652bcbd

    SHA1

    cc40158ec13ecc32f51de365145207eac823f92c

    SHA256

    c029295592c89252de52f63db373d2a016a25ca174e131b46fd0f5bdd4baf3b0

    SHA512

    c289a98c308299d9c6c5883e196582f36be907142b383b8aa99aa8993f4144a5b4eddcc939256ee3438e9ec6ac840417062d5a7725e46b463054dc48f4365371

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3a05997af32babce7f0cbd862de9665

    SHA1

    ecced80bc66dcbd285c73dc12f868b20eeff5599

    SHA256

    2d0f4cae891a6bca24bfa9d4ebc3b73b281fa384e33bbe4decd98f6c86ddb53d

    SHA512

    4707734b03e6ad862ba5405237185b3be492b9e160edd282f783be43f9375ffa20ceca9ce5f5bf28bbfa2f297d1830c73a699ef922082f3a581a48b7b35b57a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4dcd53f20c54c4c823dc61263b816d9

    SHA1

    0d2f4a215dafc99baec0b4b2a03cbf6f820bbeef

    SHA256

    7d87e1a9e09afcb9970c73a24d79ee20c0fe8efc8b4f6ccd68278c98b50cda02

    SHA512

    d07364818b4f9665b6e99c1ed9a6a00abbff45653b1db2761eabc3d660506b367eaa706e31dc7842476010df0f7549c448252c253ea984a0e7b8ac961676b39d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97985e02198ace76a48f664713ab4a6c

    SHA1

    1e15a4d9422257cdc18fe71cb1cd877f94444568

    SHA256

    c847ec9690249996832a74b748dfa2df61e110bef9dd03d0895f81e5645b5b5a

    SHA512

    58f99f8a63d68e80ce96f59c2fd74e1fe6403e2195e2a0c6d99dd7a7b49f47381cbe00ac5b22e1c4f22e04bd8ee509211c9535931abfec364385d98306d41011

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f776c8070ac665ef59fd41011cd04e0

    SHA1

    37bad991374137c3279042a03d1fd1efcefc8610

    SHA256

    8cbd38bdd122c588f33a0da141a9a8968732a6a5f0d4067c2398f659ae46d41c

    SHA512

    1ce808305f410b6f79750e32512162b8dcbc135a1a8080975f40a256fcc307c75610162b29f50bf62398f79fbb8546adcfbbb42a94d13c998230e9060269c629

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9a924edfb376b1bca5df4a4c258c4004

    SHA1

    9753de46961fae2d5c74cacf696a40a1d44adf6a

    SHA256

    6602c57145adae12e45ff6b2788035adac5a3cdb79cc0c48b35d8e3dd42fbe5e

    SHA512

    3a59af332f8d60f80680447414676e3762da7df74c1fc1265788ce9f9f26882908bd240fb61477b460df0f83e496c6379d1ddd2d0037f2e8f62e8498acf76a5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f0f9ed5e6560a7b85c5061c06348a033

    SHA1

    dc4582543b2a2e336ba0ced6ba5ca53ecf40225d

    SHA256

    a303188a0c2a727d9821d8da647244c6bb1c80441be195c9761fe8457d9fd1ba

    SHA512

    ccacda968d01878302789c382ce67d61745132044a1e36cac14ec1be7e4bd573168ecfc60ad1722ed1f87c975ee5b5c6309e7c78b69e8fef35c5437aba26fcc5

  • C:\Users\Admin\AppData\Local\Temp\CabEEE4.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarEF54.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06