Analysis

  • max time kernel
    152s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 16:58

General

  • Target

    4bfa0c424c448a8bbe9a065062b98017.html

  • Size

    16KB

  • MD5

    4bfa0c424c448a8bbe9a065062b98017

  • SHA1

    6165d55ca8f5467a69b34749841b053dd105c181

  • SHA256

    1e9bb497f765cd14f9d2f8a46bdad397d458fd43c660ada03d54119f87f66e19

  • SHA512

    f1a221acf5bf78f57e27cacbc4006b5e58b8fa2713d734cae860da93a13bf0b771e3e034f1f6e3c8419c224d7b944a7315cb4b57b7d3f0c9609aaa9cbe16d597

  • SSDEEP

    384:2lGUTjxU5fLqkB7eJA7TBVvmRa/KkTrLGIRQXV0hI0:uhefLrBAGm0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4bfa0c424c448a8bbe9a065062b98017.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39811bb07ad671c051766c3719666b0f

    SHA1

    8936a21e92fd027e9cf026f13b90f46ded5da8a6

    SHA256

    7dff85b146db787622079468ac891e18fc8fc69c962b2e0507982e488c4cef56

    SHA512

    958232025aadab15e433018020f6a25a43d728a003e605368144b36688e0a0b892c5bf45136e6ff4cb111e6057a4558ccdd38fe340068328310b128a20670372

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf0942e32df43031dbacf0ec2c607e72

    SHA1

    2a7998d31f9482485e4f322f5504ef991f30071b

    SHA256

    87d5764ed5cf454f7d2ffed2169ccdb735ed78c0b80310981a057ad5738306e6

    SHA512

    25553401fe9cdde867ae4c58a55d4e1bf34517bc56a96d11867a86cc52e1d1ab64f1a56ecf083fc723a1ce2331185561570677446477734bc4b49e7abb18342a

  • C:\Users\Admin\AppData\Local\Temp\TarAA39.tmp

    Filesize

    92KB

    MD5

    71e4ce8b3a1b89f335a6936bbdafce4c

    SHA1

    6e0d450eb5f316a9924b3e58445b26bfb727001e

    SHA256

    a5edfae1527d0c8d9fe5e7a2c5c21b671e61f9981f3bcf9e8cc9f9bb9f3b44c5

    SHA512

    b80af88699330e1ff01e409daabdedeef350fe7d192724dfa8622afa71e132076144175f6e097f8136f1bba44c7cb30cfdd0414dbe4e0a4712b3bad7b70aeff7