Analysis

  • max time kernel
    120s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2024 11:25

General

  • Target

    4b4e99e7e45285a7e40206e4cb48dee7.html

  • Size

    1KB

  • MD5

    4b4e99e7e45285a7e40206e4cb48dee7

  • SHA1

    ced1cab8edf73599860189ba8d90c13315ffed68

  • SHA256

    b7be6bb142812fbde11ee96d3e9654a7499fc1d044e8b4b819cc4a4de28da7d2

  • SHA512

    cab4e6f33aaa8bd6bb483f4e46a2e2d6c99e928aa2fcae376a8b410bf5d3ff51ca4a71c138f2abdd4ed1e23aa395099b944295935f8cfe760391c03522b9feaf

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b4e99e7e45285a7e40206e4cb48dee7.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a8a1fe175818d6c23e522aa6795e8bf5

    SHA1

    ec3a0ec50b73ae70ace862689a72546f90b8457d

    SHA256

    1ce786f9f22ad906a5ad5a1fb7ff660e792a39872282f880b5644e9ed43cc586

    SHA512

    6d9fb07d1c0d36d69143f119d23d278e204473c0854ecb8fb72f2503e9f74cd0d4457271573393b24abd1ea3f042ec69ac5c2c0bbdc402555ae2bc6579b8838b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3119982b2f357c4dd1fcf54ba7393d87

    SHA1

    774e5f8c5bc9a369dcb039fd0d49841bd23273ae

    SHA256

    01e213198fc5c5a7a15e2f145ed88d0c0f5d6139e9c18623539c33938cb9b5fb

    SHA512

    eff5b7b8e11d39519afc30f3f5b3f93c073135dd01a40a9e9cbf63553363fbb122cdccb0650c8d6fc6fa78c446fda40b104cd4f2fbe443ee6fd66c5660948945

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed6e089ea5714a1481b4d40e27059597

    SHA1

    1bdf42161a17b16b0a8047db124d08c45d71c935

    SHA256

    65acd5e0f173c4084cf78f6a65b61d060b1a269d8ed55f7ea79cb406b3945b56

    SHA512

    866f5096a50a803086d48893dfcf232d169d6eac77624ddc990e8283e921699ed82127c4c30928653ad002f68a1757e9405d58bdce53b933aeb430d1482485d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64385c9032e7e6d9cfda450440ff9656

    SHA1

    017d4d258e5ed00f682b3e9b743619b106ec2c4c

    SHA256

    e82ec15cd1e653b201b3bbf1833fed3728ebe7867624e4e51b16bbe9d6c19cc9

    SHA512

    87875cab7bd136ad9b86c24eb5515e1424507045aab159e04841a48464b5423f374f6d6fe3ed6c97d725ad093f241506c70a1d9d2bef8f24dcc4e7b68bd77ff7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a06b94b0bff3cd4e84c5ca9d95b0323e

    SHA1

    f35ef37009df9a54e351cccdfe3c0e547b6c2bf4

    SHA256

    98b6fee079ccfcd8a6252bef1b1ef9a18052b67f19eba2ddffcdf311b46d720b

    SHA512

    a10afff7fa4bf9a0f1aa821cc4c2a741f74165c8ab894f69294279959fe2de248460c8f5d4f7f9bf46fedef163582a3ec5ae3e39f7dc860c16c2cefd6ee454cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e9113efeb843fe1d42504df70b716aa3

    SHA1

    a307137778fc27d876bdd09511ec386ff52a8ba2

    SHA256

    7a198e815461bfb767878419299dcf6f9b5a07273d13a998078ac363889c5544

    SHA512

    a0c184a95d225904ae60dda89eff207885cba6e819a222dfb16603e0cbab494215881cf0a0f4efd861a4a4083141ff8deb1527801b61f21abfa7dfc4b1495521

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cefbb871d87a71d94bb0e44468ba118a

    SHA1

    63c425ff3d8bfb5ed9672a799e4c37ba20591cb8

    SHA256

    41f45b5b6a7016fda386e98d1e1473323b0a15f9cfb41097249b53bbb8a2e83b

    SHA512

    d68363008f773b590ef4c574cc06cf85524510a4b55b31421650fd8a10d0ecc4ea671ad3c855970f29585a96519c8a1f795b7bea089c3088a18939a0d5877636

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c13adb187619b255a0456b11e8ec076a

    SHA1

    95f0d3169541081bcbf1c87bb12f54479440877e

    SHA256

    0965eda275fe18f248101abf81f44b774bfe70ba06bb901aee925dfe0a982935

    SHA512

    7ea6d06b4cfa505e42fefcedd3872f2896fe409365e1ebf95117b134290569f170c3ea3e232689298c3c7475650e35986aa5a67d1647ed0c4a09c3c279c6c8fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f424b5872df99dab62be3aac827bcca1

    SHA1

    89544f809cf21dfdd051bf7660d1657687fd999b

    SHA256

    130b3045e95af3efcada5a65453cb4040a9a14ece5d09af76e03b796846ea082

    SHA512

    45dc8f1f3309561e21adf5ddc6d2762d00654b14a2e2ff3debccdf4b6dd14e69a03b53e3d98e17b87798dc49bb2ae55a2ec613b15da5650ca0ebb74f0e843a8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    880e7079c9e32729dbb0ae247fd1085e

    SHA1

    115e848655d7a8e340d5c2a3b7e3b410711d76c8

    SHA256

    5787e8f5e1a7e58aa977965766816ccfd7a55fa16ea808de7dc69292416950cd

    SHA512

    acec7bfb0ab4ec58d2f7adf27d0dba742e21c1d0142255beceac22c8582876313adf0003b8250c2409e53631556b4e3e15156b093a4b8f94f28b99163706d29e

  • C:\Users\Admin\AppData\Local\Temp\Cab9BB4.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9C74.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06