Analysis

  • max time kernel
    117s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 12:30

General

  • Target

    43b06905ede3b1cb0a033f5225df2d30.html

  • Size

    2KB

  • MD5

    43b06905ede3b1cb0a033f5225df2d30

  • SHA1

    7b3cc7e24ff620d46e254f5b3949ad29d67fc0e0

  • SHA256

    ba59f356f977f56f75d88ca96a7e381bc2623f18e1586359013786276dc96e4f

  • SHA512

    9a0c4b01e78cd12b1706bd4c149304fe28f096d86f270f79cd2c2b5d833eb0e2436fb89ef1a7476426cf4ef18f7c8dcb7403743bf397517ec4ca150ee339691e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43b06905ede3b1cb0a033f5225df2d30.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07d1075de5559b351859d34b2dc7a0df

    SHA1

    134e69bfe8a19e875c3eaa4059f2af994c4849b2

    SHA256

    7466104c06685830fd80893892a9a75429f5a893e130efa2a79dc486ee88d500

    SHA512

    de1dae40e0012e46481405c5999488527890c6b40ea05da64c8dd7d2e678a37de469a3717f623216a00d9f007a8d5a534edccd6c73c1775c119e8481793e7399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ad35282e4f296179977b2b68b7769136

    SHA1

    fad1bcb4546f863d6620c89f325b80b68858dc61

    SHA256

    896c6a52c6d67f93a6f35411fb5345a991e1388f8ac6a9a584fa5232d81bc9a6

    SHA512

    c186aa4898e1a23c33d32ce7559fd3cfecda831cd5e680cc17e262daa6f3773103792d00d633228549488f6e93066920ee8eae4866ff3a0eb0b22adab79bf628

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3d1d2973c9831a38884ea96f0ffc0610

    SHA1

    d373c85a32a5c3f22808723afcb90b2255b6900e

    SHA256

    ff2a9f43afc3134aff00aeee2115a3b497037323308727d5dbe39cd27765fe32

    SHA512

    4effe99463e9bad42bce760e06b0a22af8522251711e8888f6ab5707c14b12d661fe43b5d822f711b9c7b8b050f18fcf91e6d39be65ff4ddef9149b7375ac4be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fbba21e43e2361f2390fe126828b84ab

    SHA1

    0baa74097aa1fd69355743fdd1758d85248d2f7b

    SHA256

    eccb285ba9f730f489549f9e7e2345d51aa428c199503754ca9e4ba2e164669e

    SHA512

    b48b6b4d7d6dfc23439809dea44c2d65d6409051d1d3e5b85da6d8bd03e6d541ec69066437158bb78d96805e5c21579a4f594022c95008dd7bbdd992f95cae10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2df51b373803266284245c939a10a200

    SHA1

    883e0c5edb7d4dc0dcef624cc3d3c1c5f2b5330b

    SHA256

    33550e3774d113d7d5d819bb90e3a3aded669ec5610e004bb654ba41971bc9e7

    SHA512

    81989a15c3c475bfccc28da1a38aad76aadf7c7fef4b44ccdaf779a6bbafefe99a0fe19042f439ca2089cca58d65f60f64f2ca575b3b735b211e962e75131476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2980a25f1583f8869ca744f8edc9b8f

    SHA1

    20e742d239805a444c397a84c6954c910a094869

    SHA256

    700c37275a09afa925f574893b6c929884e7a1641e7e0922a7438f7275555bcf

    SHA512

    3522e853c5adba1d496bbd81781ce75fbb1730a77fba3f4d32cb77be5078cb1f043ce15c4b5a07244ddf85eb887672468b448833042c60573e1942d2223c2195

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a724c31422ab9c01ed9edad288fb68c5

    SHA1

    e08af06415da7badbb9677c94dc57731b21096e0

    SHA256

    b5ae56eafa011c6e4a0c345f11f4fa9295fc03b422f87161a85f2134b7001410

    SHA512

    38b9201e9bd3b8914cd3dc519d449e9a15287bae2af785010ce2054d4fdd453ad0dbf54f78c35b3b8b8f72712dbf591acffd3fe5a4e10c01555949279b9086ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2fd58645f53890467f567da29e50b5fe

    SHA1

    185a10df5fc91156b7b623959e3f4a40e2cc73e6

    SHA256

    60fdceff6b69ea155bfec2bbc3a8619b51d101898cfbb6ec2307e68fdd5d17b9

    SHA512

    1242e242b892db63d107fa35e23d02b9a7c6645c1042345e84b28260b16814d7c1a4b0bb75754d993a5a514db7a50b6aa84ad4c8ec084be391f5d763579375d1

  • C:\Users\Admin\AppData\Local\Temp\Cab9A7E.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9AEE.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06