Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2024 14:52

General

  • Target

    41268db2c680721fb6a51871ceaaeb4e.html

  • Size

    21KB

  • MD5

    41268db2c680721fb6a51871ceaaeb4e

  • SHA1

    dabe5b085bd4b1b851907a7497631a4f64aad89b

  • SHA256

    9370c3f721bdbd624fb81910de6ded73f16e45143d7888b6f3b64212ea25910b

  • SHA512

    bcd8a663eade48597bccabe02fccd6ae2022c92a97e38dc449bbc3f257260df8e2ea1bc030a6ec4993939276e7a7d85192ecb3422f9c71fcb4106633ecf91ff2

  • SSDEEP

    192:Ets1zgPhodQy5X6a5znUKnQBtncKylnQZanSv4JjnQxPnUBLmQLnQ3+unQtHi4bF:GOKy/cm

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41268db2c680721fb6a51871ceaaeb4e.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    41b4e323c4b618226b3576c6fac8f479

    SHA1

    4fa1036e5a4375c7786fad4ece0dfec8bb0594bf

    SHA256

    000407271da18c67a4698519cd9c0ddc361d863fef769044e5af85ebeac43827

    SHA512

    3987961176bcae6bd4d33f85ecde6f63399af4ef714bc37302431a97578a5850a56caf90e6cf58f09bfd19e0c0737de009c4b26b4fa555efbbee2fa41815944d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8fcebfb6863192ce0a8d95b9786ee5fa

    SHA1

    106e5a710dd15063173a2b0d6367b1859e5d7d19

    SHA256

    7069e9c291b14b23838f7e2307187c7b87abff17fca103e4d10f8ef1ee141214

    SHA512

    09710534dc5b754b986a3a45a4f4401790d30a014693d369659a08a8d9ff365dd50671c9b400b72be659914217c62d7337285ec5b1983a739c287be4363b30f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa2d48cc64762e9b758bc54d9b8e448e

    SHA1

    9c290301fbaf4d6cdfd81e448ed04ff1e2f95523

    SHA256

    e478e04d09083285fe780afe614e019614e9ac1d9057be8d73b99efdb6d1233a

    SHA512

    c51d8a6e5708be495e17864769eb9c1154a540b9054613df677b6644f255c5ad2be00d742378dffcc032412486284a3d673fe4c192a4e94f64d93bad5f896072

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1c3e8b2140dc613c114071f14f617154

    SHA1

    2f3ec791a0a330fdc21f2ec6d0fb89ec7259ba31

    SHA256

    bd29f2df54062896c38ec83e8684225126108a040b0781f9e2da14838ea0490d

    SHA512

    1a77e2ea685c767dfa1c601f5bde79118f2b5f7631023e7fcc936f5d5af130dd76bb5e6bfdb02be28761a5eab5da23a5e74df141208401aa8bee3d03ca4d7146

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1ecd922d7090e1fc754ee46ec9033bfa

    SHA1

    b82cf139948f71dd0fa229803c3d319e3a2cb8ad

    SHA256

    5188f301e7fdc6e881b9f16ed5992a0e6700ed28c0b628589cdcb510a6debece

    SHA512

    6d42e7505162ebc85acf91d8c394937f87eb9950eb70dfa6bf5f96035a07d372a483854906edd807b295a91672ac34fc06a9f5eb454a04611732a8327edaf21f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0891c5d1f40c5ed985607978cc02fafd

    SHA1

    c4272e548e7e2212b797f3038f1e6b8fc295dab9

    SHA256

    95329be105ab838d11d5c49806181a1f9494ca423fe4573922546af2c6958bce

    SHA512

    9101c15c8b77a5cf35285b9eecd0b92db0e7e88a2733b564e7092a6abb9299795aae1c36420e1d890e7f4e46379d780ea0b6251e6e3f40d08b27cf41b695ad80

  • C:\Users\Admin\AppData\Local\Temp\Cab715C.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar74E8.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06