Analysis

  • max time kernel
    0s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 10:56

General

  • Target

    43803eb159dd57732433a2598ce28cc5.html

  • Size

    153KB

  • MD5

    43803eb159dd57732433a2598ce28cc5

  • SHA1

    110ee3486e56dccd5a49fd4ebd24756259ae79af

  • SHA256

    d3b246db32e4e0bf271c566818d91a03d6aa1abf259848e0f23bc1cec6ed870d

  • SHA512

    e253d848c114fd83b15d6682177d4c4b3c340a34ea8695b0e7daa19d1f2e03c15ba7db176b2dbc490498964d9d0c466d8aea50741cdea3d253bde403142a08e6

  • SSDEEP

    3072:HjLzGZAhrqsI+wdM15O3GZ/QYGkNcjgxU80jbtn3JmP2Pmg+aUPEUi1lUUlqR3+b:HXlqsXwd6cjgqdi4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43803eb159dd57732433a2598ce28cc5.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6fd148384d006a2f986793b899210ce4

    SHA1

    a45ff1250951c02dd9bf9da1031d2646bc54d71e

    SHA256

    5cbfc1c98438a663af29ecdcc17900e4157e8c46123f505424f503703b3d9fad

    SHA512

    245c993d8898db412fcfeab167b69b2ba72710e09f226cb7fcf1b61fdf55f7e5b74e6b495b63588f0a0c4641a8a21325234797556c85a7ee553925a3fa183563

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ce3dfc16204039753570606c3c77a654

    SHA1

    c4e6145784b0caca2fbdafaa1e89f5940165cbb6

    SHA256

    7e6acc56c7e0a532ab33aae64423cb51236cbfe61d109749eb33341e99715efb

    SHA512

    84171f42d682317bc43f1d913927a6e17b08cc5d152cf9b43d63eb7da8ad1cdf678b1c85e4fd6c20ed2c31d404feab89b07a2e245b2590372db4a95bc9d01317

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c877103f5104df4856523b17294143e

    SHA1

    ba06e7d2c809708a5f7e69e7c8a7c5660a028472

    SHA256

    7985dca755661c3b199e90b1c745de9a363cd40ee78b1621421081f62d912946

    SHA512

    1815cadfbc789692470d73886a6df868da7c442b58fff9a89c95cf38b5e6df5f6febd2516ac15d8f7c2f6c9f37fa9157e62b640da6da4213c34621daa45e9323

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    44e9dd0b5ef110d2bec00e4b614bd441

    SHA1

    7be435b5ed680ef10cc68de6bbadde039b625f8b

    SHA256

    d9e9adaf7fd78b339a0b498d104bc818875561725b8ecf48b900d48c222ff196

    SHA512

    85e35971b9a93a77313420b4075d4e2039b85ec31e98d130615af743048026d9294568e1aeb4fd861d43a00a8c3e308f8dd75f16e1c67ef540cf9077222c52f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fbe6104951d755b123e6be26aaea9ef2

    SHA1

    e33f1364db5780cb973604d45251958bf328d783

    SHA256

    1b5b3b189232b97266c0e16297337e045c7533a5a46108dc99e6ab9b53825274

    SHA512

    dca4623d7de474bd702271d3607359f88a38cf70b6dcb1e329a2653ea014d2f0d05d6c5bb8d0465d9b85e84c71c083a5e5805fa300bde91dad0e2a0f00681273

  • C:\Users\Admin\AppData\Local\Temp\Cab1670.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d