Analysis

  • max time kernel
    131s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2024 08:10

General

  • Target

    4330186f161a5a44cb54df1a1e3785df.html

  • Size

    27KB

  • MD5

    4330186f161a5a44cb54df1a1e3785df

  • SHA1

    2ef88c054fc77aca04ef00e97de298bafac41d72

  • SHA256

    65e2d826ef272e4fb9534711f8ecb65c8d9b0e8668786b5dcd25032bc1625cb6

  • SHA512

    b98f49c696190e8652804e8b4cca8c1ddbb3c44962be54982e723120cf6a7ec2bb1d078db2b3a7ae593c1b7fb7297ea700791ca80b7451265e766d57f8c0a271

  • SSDEEP

    192:uqzf3Tb5n+x4inQjxn5Q/wnQiezNnknQOkEntwGnQTbnJnQnCJVevo7Nt6Fo+NzD:nlQ/gygcFda

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4330186f161a5a44cb54df1a1e3785df.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09dc6dd1f7291a2bfba5d04241cbae4b

    SHA1

    6be9e1ade9905ed42c0e8dd2ab56f767a1efa236

    SHA256

    8473599163880991c36f1f0bf9067adca8c830469d9bd9f5d4047bac56873ff1

    SHA512

    248777e4a7def5bc932826fe6441cb420ee5332f916d35fb3d53df07f2fe7e9a56a7e17068e6e307b975b265dc9744179d9819fdc0ba3a938e6c096bf2a2d15d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3baf48251d422702dc4b88e0bba6bb2b

    SHA1

    be8a18fd54a135413001c360adb472a0464ebbc0

    SHA256

    6ed13eaf9dfe8da09676eb917ad9d473c50c3e89473597ba547bd1232748eca8

    SHA512

    901a11d24024c1625ed3b0f6d73076ea4cbaed316ea7eecd62fcb1c6f1d15cabbdf4516ab40e2db5b40af9e0e545ddcec7100a1d1e21e016045bcbd4d47cc6ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    42f2d1d157738009bc8aaf14c01fc58e

    SHA1

    45f34dd102f77dd6523172a99107edf76e196ce4

    SHA256

    13eaa52a6ee33f41dd4df41a6bdea690d115b07613f8de1b9fcb0a4fa06501e8

    SHA512

    2617e67f157f1ff794b98cdaea0b6ca866bfa4a2d6b85747edec016c16073963f6e2d8f8e19601b0160a80ef8315c79f6c4518a79f8b34e2efa9b7937302449f

  • C:\Users\Admin\AppData\Local\Temp\Cab45AA.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4F6D.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06