Analysis

  • max time kernel
    119s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 09:59

General

  • Target

    45f0cb3abc0637175d12751fbfe2ea78.html

  • Size

    64KB

  • MD5

    45f0cb3abc0637175d12751fbfe2ea78

  • SHA1

    57ebf732d9a7b5c6ea772f7b537d878de00f24c0

  • SHA256

    3961d745a24c916bc4185d95e0ccd5ca4b87e2277ac9c8f9b5c32241600d1c62

  • SHA512

    f0caee89255be8c2c01478afad005ffec68a604111c9014353b8e709039efe76688cbdd492ee418d41299120e3551bbc489f977019ce6af5e99bb1e1db266a27

  • SSDEEP

    1536:/84T+5pRXEOhR1S507wJNZLY9flhZGFmCgJDUE/tu:Uj5phT1WqhSmCgJDUE/tu

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45f0cb3abc0637175d12751fbfe2ea78.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2320

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

          Filesize

          1KB

          MD5

          55540a230bdab55187a841cfe1aa1545

          SHA1

          363e4734f757bdeb89868efe94907774a327695e

          SHA256

          d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

          SHA512

          c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

          Filesize

          230B

          MD5

          9f78b650287349c369a46ad1f2b6d515

          SHA1

          18813d9e873681703b6668e5ba10f5628ffcf4a3

          SHA256

          e665732d1c5e0297a24fd98174a08c57af503ed96d9f66537ab01cc5833361db

          SHA512

          747eb4255771adb6fa68da8aef56b9949cf0f054b57920286721b7be83c371a8982ff6b927c256044801c28e8fb22ec80b3f9d4e25926bad279834bedecc6ee3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          177597f00914940e2772a84891c67d60

          SHA1

          65a13a4f0fb0dfe25383fe77ae82b862df2f0f63

          SHA256

          46637e01ecad8c1b4f2c98cd00abc25855000958b81e04615e236a0d103590d9

          SHA512

          590370cbbe9babdc65fd1643f4a464ff8374ea936a5443611e194f08529ecda7740c2b66a38589bfd41548d499a5419bc4bee36285ccbdf187a21f7ec4c9635f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          970744ac65709683c310b737bda5d469

          SHA1

          84b29e49ce33b39f72d411e007919e3e67b28a6a

          SHA256

          a26cdd7b8726fd0ed7a539fc79114178331f27e2bb98710f5aa2376868b3362d

          SHA512

          39f53e9fef1346d6039a6148d97bff2701f02803f347aadca742aa14ac907e71853bcf1f62e4eeb018058266c8f493b860286bec9c43217590a570a26bef9f95

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          2c3ee14af64d0b3df2dd7d0fcb9e2636

          SHA1

          6417829bbff2e33e96c7ebb048fdf819284169b7

          SHA256

          b526426d2ba55f66349091a32d6ba55c31850d8444e5a07b1e27a569d9c36b37

          SHA512

          1292301d27ec628d228797b178278ab94c8570cf9bf47cb3b49f80e271d1ec2516376302dd8ffb26d428fd1ea9c4495d6e1557eac0a73cfa41f1a2e786e22d03

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KZXBLAPE\platform_gapi.iframes.style.common[1].js

          Filesize

          21KB

          MD5

          1fd4bd70ce209470267e6f12e04a9ec2

          SHA1

          7b1a69d12e4d9729cfb090be7bf9b85def691f8d

          SHA256

          89c214ada7e763bdd43e23995b25dd445afbcdf341395b4953e59f3c9757e933

          SHA512

          0c253b7107b248689a40daf6bc53737b1393ce3d67e578281ee01c386d9322461334ccf411b73d2c4f27f9bdd5ac2b8f66dc32a8c1eb78e866852ecaaa8d2d9e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VUBRC2YP\cb=gapi[3].js

          Filesize

          44KB

          MD5

          43fd21d8c863ff4053cfe98ffaa4471d

          SHA1

          636708d8afb572af42b41b24d14fe51e52771dde

          SHA256

          41d0af51dba232eaef1f2d2fb6ec4b5b336c088fb14308e568a9ac5a0fd7e272

          SHA512

          59e470cbe1096365579a0abfe6ce4fd99b1e0ea356182fb5a1c583400473263226623df0c19ef2168b8a391f5e72600ab119f478d2e1824ddd9f22f10cb8551f