Analysis

  • max time kernel
    118s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2024 02:29

General

  • Target

    4d1aa8bdee052d1ba14a48288e1cf9f4.html

  • Size

    55KB

  • MD5

    4d1aa8bdee052d1ba14a48288e1cf9f4

  • SHA1

    044fde4f1a545ca208e659234743f167b095b390

  • SHA256

    dd30b0c22d54d9dd98186c9006ad53323a7cf1599751aa329ce49af7e105ed07

  • SHA512

    97197907a21b3d3f806d1ce016f2050f2a38210a6679cec863fe314c427c1c28403de57a3c995c90fdb0c481557e9b02061d3a29db0006e49d81319dd7a94b4f

  • SSDEEP

    384:uu6MKDo0lAtsdg8KqobxsITHAjxkG64FKfoavfaGYTECQE4+BKQoM6GEx+X6FSTP:olMvCM3Grp6pD6L

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d1aa8bdee052d1ba14a48288e1cf9f4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67faccd02948f67789b1b507af1fc5ee

    SHA1

    fb7f7d521d9638ee3499c09684cbaeb63268f4f5

    SHA256

    459198652eb40c85bbde419bfcede2989d8951631133b9ff1bde2bc0a9008ca2

    SHA512

    8a72d345159010818a7e5e4aaae7283e7cf11ba5b325c6cb49d0820707ef7934aa984afc2044e7913467f13c4b119f925d9a79dcb3f551e73b59574fe51dec6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8184ec84703aee325c565411a1f74bb4

    SHA1

    33c90aae41f3cdd3b0f3ef3aecae49c2c901040e

    SHA256

    545d9acfa1c79dd70f966de6d97b432755a2570503dfb01380a713c89167b354

    SHA512

    83f657524921e9893fa9e2797e8c36579f0f04d2532d52f5e2ee4aee08b0817df63ae5398b33050472c7aee4b2c0ee9bd8560db9c78783984f9462cda184a5f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e60bea79400ae80631a3349be5c64f2b

    SHA1

    2678c328e39aa3c0485d5230486bb749012b7084

    SHA256

    ca16de5ef412c1abfca5b45e1c13e2c1f1b3dd614caa09b69a689224d248ec1f

    SHA512

    aa658b82eabecbab39004cc7ac5c05d4c1ff9238a5690847039aaa9a6123245618860a482f6c6ff29e8fc888658d45d7b396eb3c4011e77b0fc7f440a2b4874c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    137b3f8320f00dd62b99d24b61b8ca4f

    SHA1

    af69d199afc5422cebafeb64957a34996712ed98

    SHA256

    378a3eabd0a3a359918bd30c36b5526736f70cdfd09b414473d810830455acb6

    SHA512

    81e9c27c5055a20f2fca6b56f291981bb0740aafa023decf503dc6a1ba97d5c3d89a20d09b262049bc1733e30d4692f714897e243ee7adf1fb7172aacd4450c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bbd2353716ad86083a985fafa6424592

    SHA1

    f00e7bcbc0dc3270a61d038f51ed6368cb13b739

    SHA256

    43c99f8fb969d148d655c0c929279ab538243f71e9ba185e4e9ab928111f8d2e

    SHA512

    2f016441e8627e8ac8370bd449b8ccf2383421108125074a17becd0e1c1dbd229fb0a9d35054fae7b0c01b46f0016cf9622e95bccdc841a2f5a7e8ed9c29272c

  • C:\Users\Admin\AppData\Local\Temp\Cab3C07.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar3F73.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06