Analysis

  • max time kernel
    118s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 07:59

General

  • Target

    45b318f5f074d3d7b030bf72eca3a4c4.html

  • Size

    4KB

  • MD5

    45b318f5f074d3d7b030bf72eca3a4c4

  • SHA1

    ac430db9fa209df488291815fc683f07a9879d0c

  • SHA256

    4cdb313c733b46dc30ff009aae3a5473f9f823f0cf576801dce42d67b7d1012a

  • SHA512

    7ac3efd39966bad31780c1f560a9445fce6e0cfd3290c9c41e259a1d67cccb2d6dc3ad5cecb4a982d39f2d151c6db1b566c0415bf512119139455e51c9fb406f

  • SSDEEP

    96:rf9seakGiwLsvfpFFOxUEavBUqsOeN0Eg9jag0MwU:rf9FaL7LQFIaBvBRlVEg9+g0MwU

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45b318f5f074d3d7b030bf72eca3a4c4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2264

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          369ad767db0c325166493792d32ab7c8

          SHA1

          158db1adec95efecaabff8ee98bd752f0f38c7b7

          SHA256

          f9b8b60514cba4a811e2890560f9a3c6db9168d6b058795f4cd4608f548ef95c

          SHA512

          114d42c2444ddaf16a2559c1aac3ea2ef83d3fed757ab0baac58deb6793fbac4a5f3b17bf86289134c8ee6036162b211a6a35bcccd7143f66b94f1e5ae9cbcdd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          67f48ce31aedf2a9465f5903fc9a4cae

          SHA1

          80d202617808f82f2ac4db181489bd0bed4208bf

          SHA256

          8f7c97fae8f0fb7d141f5138e54ea8cbb0fd8633577ea854450d07e8e4897325

          SHA512

          70060b9f8838f3780f0b687e97afdefb059c237e762c3358d87eade96be44b7f8b688f3e896b6c571a44fc85c6351b07a8a106ebafb898f3b024e94cf1fff116

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4f1484206c48148f4c5b76c8df00c971

          SHA1

          572f114e86b9124608ca0b2285977fc1973fe142

          SHA256

          184364e214669f14b952db1dc501ad8b7e6077aa8aece28e48c01e677dbb3ab8

          SHA512

          209d8cfeb4a241fdce6607ffdf510215805cb2e2d12f5ba018debb8b74646033e9f70b09dcabb7468dd85199740ad938bf5c7722b6f5e8ee843cf7a71b260123

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          878e1e79b2e5ce5804b4e1030c1aa315

          SHA1

          6fdca890a591db66a0717f809cff03a6eee7d752

          SHA256

          ed59114155d10fca00835851c6cec9074fbcbb69695a5835c58f0b9b4ec132c1

          SHA512

          498a59dd633651355b4422f50dc9340bd6de31c91058cb6ee861fe8810b854afa44358608fd0c7799a8d29abfec57f333c8c62a3813d0b63d55dcf38a5b33de4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7d0e8a5a3cde792c0b2fc6fd545e1dc0

          SHA1

          0b36be346243f38a661b9622ba27f7cba595d450

          SHA256

          ac17a148cfbf343519c86472b2861ca4d0d1c77243bfc28931367e8db729e3f4

          SHA512

          0be869854d4525e5a8fc6654f9ae81cd46bb528d5f25a5e32c8e6b5c8291cb3cec518ad59b7160558c9548dfc92d95d93179e23b4b91ad6297913431cbb3bf4a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          cb0083fe8b526280d49e08d7497c0092

          SHA1

          0d9933d402d2b769501255de236a81578bbd9ff9

          SHA256

          e03e66b022aabc3cd55a252e8a8eb1d7cc75d34771987294434dd01acacd464d

          SHA512

          5285e7d40add3f2ff3c85fde22455245e80bda5a3d182d4285b7c74d7b44dcae82caf1da20d0af9f7f8e38582dc2d876d170bf3e521380de026ab67128ae4449

        • C:\Users\Admin\AppData\Local\Temp\CabD867.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\TarE4D9.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06