Analysis

  • max time kernel
    122s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 13:28

General

  • Target

    4b9076fcfdb5a4866a763582b22bc6a0.html

  • Size

    37KB

  • MD5

    4b9076fcfdb5a4866a763582b22bc6a0

  • SHA1

    f3853c265563832b294aad8bb494cd77e1e6caef

  • SHA256

    7585c0e6ca719136336e54e01d69e91448a2db87d5750357f6fac2c9b350f4d7

  • SHA512

    a689eeb9214c94b7f1e18d61b5eca738d62c71b3b79aa7a96b0aca2fec3d6a1e86c74aa206c47811aa37a3d14f024a388b14ef797e41a7419a76a1f59db70c2b

  • SSDEEP

    768:1b1Y9+acrAGrzhOBfifBOKrIiCKjn109N6YOviBYiFJPVwOIQnL9FXB84pl1Oh42:1u9crAGrzhOBfifBOKkiCKjnm9N6YOv3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b9076fcfdb5a4866a763582b22bc6a0.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2784

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          1a6bd9ab9a5288cf8be499df20c156a6

          SHA1

          1befd3bd20685cc3fd53c4fe6b7928241fb48921

          SHA256

          46b7a1d65cd0ba2cea5142c504b5acb4d44f0834b0a4401cc402d738949e4429

          SHA512

          d75746364baa5f1625599a9092d755aef39fd33dbd0893e387984e4a6f25d2a4fd07a553da4138ffac8d5c7ca085edaccb25204c41ff952e9ef3ecdf3dbec25d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          966f49194d41299d21806db821780cb5

          SHA1

          79bfae4ad5f17b047db458ff6ad3216db99c2ad6

          SHA256

          6c2bc5c42fec815872c61d7aaa7a16f58923237506f3b88c6a28b6690892e8e7

          SHA512

          2a774da23f92474cfe92b8b7bf057a22c4391359c5117081c643e8a3833264ef5c982d7dbfd2824546a87eb7e6ffb33a4874313e687e38925cc2e669ea0d1f26

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          59d1fb24a0c4220d4e553a44ba3c42d3

          SHA1

          46983cd0c5e199ded95ddf3a6ef37827d0b15dec

          SHA256

          b29ad8c1786a25e9789b3bf3ed28249c29fce2cbad803b9c4bf017e038370e74

          SHA512

          b7c5c6c58ee6c5d678693e87b4446062128628599a210ce4d2c805b0fe631fe1c04d94b547388f7af8dee77af43f559e3b30cdca7c44aac55841a8678fcfb96a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a1c59d020b00b9ca1b20d38079eecab6

          SHA1

          bc7098b8056edcceff0134051e9fb55d9f0845f7

          SHA256

          2b328f3b69e88b9896b26c546715da5516cb84e93a9e2bf8dcc48d00c63e91b6

          SHA512

          d6a5c9071c86171e389deab6e1752d4f8ab9ed59fe82a24a45496f4dd33054508bde17cafc4bb62c0ccd25dab7ef96732e5e7a532d7942756c4d7071c55e237b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c58ead055de18b26676d04896eb49bde

          SHA1

          08ab6261519bd858ec4d4ce9b1867f2a830cf744

          SHA256

          8bd54200a331b2a080c72f1aae8a315d35ee96c7a88b59e6c7589e9e4f1a2142

          SHA512

          195355e48873fa831b7bc451fd93dfd324b7a229c702079a54bf3e6bb24a00c27dd900d8dbafbf1647923237aa46588b09ed81080ce34be87d196b327b8e199c

        • C:\Users\Admin\AppData\Local\Temp\CabB406.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\TarB783.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06