Analysis

  • max time kernel
    128s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 15:16

General

  • Target

    49542dd73919ac812e3eaf548f36957d.html

  • Size

    121KB

  • MD5

    49542dd73919ac812e3eaf548f36957d

  • SHA1

    bdf03280955f5ced47f1b9cbcb269d1571e6011a

  • SHA256

    b076c8555cf50e9f141975c1d7aabe508ecdd93f1927f956c8d1f810ecb7ec15

  • SHA512

    17bf6cd50d57fa59092a10ebc435a3ed10ab976b07659fee4dca76eaa45ab35d31c310ffd256a2f45f380b8e9b6ef37fbcc787ddfa77e40408af7598314bbc6d

  • SSDEEP

    1536:aKIB+U49t6ouxKIFetb24Wf62ncO9aTsIcbdYA:aKIb4bDuxKI8Hlf0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49542dd73919ac812e3eaf548f36957d.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9d09869056b278989b3eeb841afd0d72

    SHA1

    42d58a91cf22022599ed6aad9b2520ceffbf2468

    SHA256

    92c6bea579ad911cfb5fee50b03d7bf1d275a10ee1f10ecc4ca4157ea8f8123a

    SHA512

    de7bf4fa7b45b59f5b590d3375d489cdf3861bd3cb11284bda2b0ba384d3602235e027107405802b2ce1fa3e12770c9ad604b633b5c78f4641c77306750ff56b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0fe49af627274f4d8da1321d1f97e48a

    SHA1

    300355f4e8c81ec14d0819828c71431ca5a6c370

    SHA256

    54290731816e20314d0ebfa7562412b4a3cbe1d5c058fdd5ff39addc8db67049

    SHA512

    e4f400675bd81e5972dfa33940eac39ef15f479e8433a53fff4b699036fda4c3a06309a8a7c9249b9f9c198b40ff9be0886a6d8871f4b496cea11cbd271ad324

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b91e8fb8caa16627fdf7856f6ff44557

    SHA1

    8caef2374ede1d3ee99a594c0c457e7003c8f2b8

    SHA256

    d3ef08462bf132cfcf580cfeaebe8aac1ab016b6dda6965739a9eb167ce3babb

    SHA512

    7328529f84722ffcdc2cfcd4dfccbf26d2a0dae0b83838dcff0e2c8e1622df7eb3a16a691c3f3c7946adb8416ba7d1cf143106c6f8e6be1f98c856890f412e02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3cdb4afb7e8aa9246e599c7259945c4f

    SHA1

    88621513219366e13d00d6d2ed46f49e76c8045c

    SHA256

    b84847fa55bf525f75a7b1001df6f1c56d7095b95bbbfb7715ec2b8ad19834dd

    SHA512

    01dd15f1c821ce740b30f892a48fe3e5c42cb5fab911c3a473117d5ea3e6d3b51863e47afdbd25c35a919ddd5b796795d29a4103bbeeac1ffe2ff6f7093fa27b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    70f6662cd55f61aad9d62354737f4b2b

    SHA1

    ae58569c87ac9bf03afb7f39863fcdda58c541ec

    SHA256

    3aa78e21a7c8515ef2aeeeef8ead3d11279535b62233453f7e1c0108ea777553

    SHA512

    34ababcf321dbd8043d150edcbae67adfe1ea0cfb7b0eaa34ae9b8f172c109c7be9de7d820e27fa863b744ee62cfbe9932278c167190415ae0c9400ff108365c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6495e642709649cadb5d128b96ae98aa

    SHA1

    bb6aa4d2afd3b5af9cb3a4743efdeb1dba88913c

    SHA256

    30133a42357f8417051d24884a0ee925020cf9d422643731c02a20bbde39efe9

    SHA512

    45fa85474cf2e52f0fe60ea20de0efe58c61213bcf50e9c2cf557478c89350298baeb2908e6638c4976c5386797e9e82964f9aa3bd0693a7cde181fec0f85aab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    285cfbc8d3fdab4af3f8997a8defaef8

    SHA1

    0929285963226ae88329cbbb5011cda3644f47ba

    SHA256

    0037b9b0aedf9f1d0abfa1c748e90930104bbb04ebdebb9b0490085bf2ccb8c6

    SHA512

    ad7b5ac4ed30f25d2b7f9193f49da20c5ead159c2ff44649b10c2aa35974760064672cca514b4d342281b83bf3e8ed38cd8b15b0f66a5d01cb9a608bbf7186dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    43e65d5d9880725e43a8bb2ee42928b0

    SHA1

    f089a1e69b4c9fc6972c38f1598d46848626c47d

    SHA256

    2a67f5d836c19a94c4692863bd0f79b5774a12750921f06d80b1cf2a4de2d704

    SHA512

    67515b0d6dd4982374829e0f1d32f7ff058faa7eba402dad4d44a2be6bf57b5425c7a4ddd92bba9c4412cbcf57d113f7c2ed65ea73693abbc34678fa7f09f2b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0ff694bd8a3dcb1535b5b90507b15e96

    SHA1

    9ddb550cdaee4542adb67df86e34c7c52831d806

    SHA256

    274382f0e1ca27e4555acba6a1b29d83221db8f8a86f9390c072f83f43d8774c

    SHA512

    24732ec9093682dbb64fcd0b385da52af991d1a4db1fff84b203497d08c4f705be7ffbd9a80ebd7e1298d0386d5a35ad547ee35beb47bfa53a20f89195a7a9f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8819127253ff0c7f11c5142eb36a85dd

    SHA1

    3f771babe4630637da070f6aa8a319b412a3f03b

    SHA256

    5abdf847ef6ec0c02fb3f001a8ef24418f8c1be6c02ab167d0ca8f1445245788

    SHA512

    503aab6e22c5c596ba90fb2273980e3d0b69a3292193bedc4689f53d68485c4f2bbdae718b745d4eedb7d718adea7e36d3c88f8cd5b3c70f3f05cd41aa792102

  • C:\Users\Admin\AppData\Local\Temp\CabC69B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarCB5F.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06