Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 19:53

General

  • Target

    470d7c7c130b35119f72f6977a90994c.html

  • Size

    35KB

  • MD5

    470d7c7c130b35119f72f6977a90994c

  • SHA1

    1a7922912d65ef6028f7f9c8beaa1d530c255a53

  • SHA256

    b9de309acf6e8d8bfa78faba10497c6693d4107b33269e39cbff0ce92bd971ad

  • SHA512

    0b19814f77064a983e9d3e021e7724471ff9d276d7cb69c9bc24a4c092a218e9f031c424cfe19844b163f209806ad4fbccead635d2cc89d2daedc5f90e35d000

  • SSDEEP

    192:uwDxb5nYTW6nQjxn5Q/+nQieVNnfnQOkEntmYnQTbnVnQOg4cwqYtcwqYacwqYQR:hQ/AqVk5vurD/nij2k2vvK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\470d7c7c130b35119f72f6977a90994c.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1932

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2a4a723ad92cf2297618d1d2edeef3b6

          SHA1

          e517c697928d8a695cf29cb1e0f9cf9273d1feb6

          SHA256

          36d0a3ed5c51a8cf766c50afee67b710546a9cce0b0845469f1af7d6ccee3aba

          SHA512

          513b25f61713670ea6214baf77645009534d3dd92668f0bed514e4822f9f5ecf1bc338d3dc647249cb5ed32454ddd204aa02ec7dbc0083fa2c6d9bcc5d991582

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e95715431078598fdb777229fadd8206

          SHA1

          06f9ee000dd03d467087b408675e6800f6558d63

          SHA256

          b29b2f1346e6d9d632ec85579d17c8d23ffa513eb6a3f4c9d5c66baa9b23bf03

          SHA512

          ad9f35e88d2839ad5caf6693060febe7391eda9cfd6ebce4e1d95126faa3d3c0d39d77f65d27eca37ce3d2fc41549bcac52792add3a15dd4ed9a06bb81857f19

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          229ca7e2d5ed7cf305bfe8aa52777802

          SHA1

          2f56409947518d95f1bfe46625e247f00de5ee5b

          SHA256

          30991e5672e45d0b21bfda5bfe180201bb6b1363595294d1bc687544ee31be72

          SHA512

          0c9824e29591e624b268bba97030c074182ebe6436da70fb12e6fe8cbc7dce44759391c31ec5eee4afcf20e928cf4f2915a4ca4c80043a9e92b42552d37fe001

        • C:\Users\Admin\AppData\Local\Temp\Cab426F.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar4291.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06