Analysis

  • max time kernel
    157s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2024 21:57

General

  • Target

    49df985f5e698ccff6b2dd092dcc5a60.html

  • Size

    944B

  • MD5

    49df985f5e698ccff6b2dd092dcc5a60

  • SHA1

    4ac8e3455eaafb42fe5648e788ec4e535985049c

  • SHA256

    82c70ee2ef5d1278de474b85730b7140bf6efa44b34e3644d6f6926b1240ccc8

  • SHA512

    5f51fd9540c3ae96cb0379ecd0919db1b4c0e2e69c1148215445a5527da0bd69faf40ef30ddd955c2c8d27e2b488470df294293ea76b31e84eaa0a6b62755484

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49df985f5e698ccff6b2dd092dcc5a60.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4415a57289c0a8174a6d7879a0d785d0

    SHA1

    7a2549f8055a75484262cf55b6f8165c90dff0f4

    SHA256

    ad7b8e5ee82d793f988d0d19d715baa5946ba7ee7ca330d933a9ccc3bdfe3c22

    SHA512

    2aac3a1b295a0b1e25bfc5a7aed25374e1626fa6633c4a079af3c15443cf68d00a61264e69d1466863f49af348cd5efc2b9bb5beb5c6e3d0467adac0701e1ebf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fd65933fd36ae73aca26c96c09b6ccf3

    SHA1

    f3e71fe08bdbed09276bea6fab81b56554e04da9

    SHA256

    f03b231f944e87d3e059f8d1019117d10a0bdb432388297ca5706abb657e3543

    SHA512

    b084abbf8a518efd4988639db1ceee68986b04974b14d67268f6f537b422d86f74fe93ecfc0df66471f4d0491d47177b59ac4649a9accb334ed9b20308f31dcf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    521433b97bae97f252068428aee064f6

    SHA1

    02c015293bc941d2771fc2c1659a6d21bf9f7cfd

    SHA256

    6a8c516c14798d4327bbdeabf49e4a86109fb9d1a0df025c6d0385f636d95825

    SHA512

    59c30611cccd0575d4843825216003fb9e910d5bd89865df3819d2e1e7d0c4713f622f13cf3d1dce97dac2c2b2aa22de9547db048cbadd1e0e6061f3d9aeb32a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3b6794aa1bc7d58298ced86b4704bdd

    SHA1

    a18c17f1135697995a24d18701ab0eacf83833dc

    SHA256

    c98092b13f450adbdb50be3bd186ffc3f30d29136dc2a606cf3363a20f991b86

    SHA512

    7f0ae626842af19a2d82c81a7a094e2f0887984ba34b1f6b8f6aed8576790615a6e952a55d4972276db24b3c1381755cc531dbfe11b3adbd6378503db813c5a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    98fbdbd2722ddf8888a7965bd4fb4946

    SHA1

    1db22c818f51a64658f980619e9fc26529074ee5

    SHA256

    1b7ae8b055a340ab973a9d1a13594577a262ed7d5e5db7d01f5466df93eaabbe

    SHA512

    a556c523f2a5b8f8219226c87bd3251d5bae94f4d7ffca68d5769d8993a00708a8a1bc923c6686a5fdfc92c1ed0aca02942722a68d952d81f0b92b0b7fa171a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    35e1bd29e0c5f3875e0089bfce2d9308

    SHA1

    ff4f903342459285f151ea4e8e263431366b38f1

    SHA256

    451088c7cd463b88c4d62841774b578b45c25b4873d3097da5e5f3ec77697d09

    SHA512

    19ca57edef63cc5a546f9b82794f3394644f86d8094a661af3c3a5ace900a5b0bab3cd67be285ad8ca34661110269815b0d681c781a2a89a748dd37b703fa33b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64c7c39c7f2b88f0d6a12d4b6ecaf93c

    SHA1

    425aa7d0e555af19ab2923d3b6c9f113cb9aaf0a

    SHA256

    14205113c31be72e3f8f0bc2c6d1d77787a14d4c4a4ff970b0bdd326b83d33f9

    SHA512

    d7f84c87c57de552468b201a677b4c1026c52612115e9a129252ebb72fe3ca301feb07aad9a7b26bc1e71ff6d778093b0444adbdb73dc3732d4c2cf79abf1cbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7de62379c51c98ba0171d1f5075cbf8b

    SHA1

    4078de83c1910ddb5e9d8640f1b8bac1c3ad4da8

    SHA256

    a81b2ef6578b306e3ba5e3eee06cacb386e2cbbcc1c6e1e43bc3058a90a91fd9

    SHA512

    f3021bf37cc7e2cc230211ff2bb0656d8b804acecbfa9d332dd76f8e069a5ac809fb0e893b99d40d358ffcb2995fbe4d6aea29764159640b59849dd9997ef2cc

  • C:\Users\Admin\AppData\Local\Temp\CabA046.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarAD94.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06