Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2024 05:48

General

  • Target

    52b333eb66a2769b6a5bac8b7131d79f.html

  • Size

    53KB

  • MD5

    52b333eb66a2769b6a5bac8b7131d79f

  • SHA1

    b4d1717fbc027af9d8c606f5c61167ec6af21549

  • SHA256

    e30b7874a8a19fbdaa5641a8a97310ef61995ba7d1556d31374d58a876a33b31

  • SHA512

    46ef288f595891c2a346a4fe27f19ef6fef3e8b734f0586a6300688bb059b0a0258a407cbf5db5595d22fca148927e655917520d512f81a32a1d56adf1ff6aad

  • SSDEEP

    1536:CkgUiIakTqGivi+PyUArunlYK63Nj+q5VyvR0w2AzTICbbZor/t9M/dNwIUEDmDn:CkgUiIakTqGivi+PyUArunlYK63Nj+qn

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52b333eb66a2769b6a5bac8b7131d79f.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    921afe88bafa5d65d30b9ec64b1af62f

    SHA1

    826b4cf78456d8132c7672a54f4fd1fbf68087c5

    SHA256

    834ab500d77f3482c6601aa01b5dad948242d16034ac00bbc104fea7dca325b5

    SHA512

    232a6d8626d0b402114fc80868e65eee8945022cff2f48977a2fdfd48835bc953d47dbce3fdb2b23c8f63ba8c4d96df0a19f1c50216d7982a97b78fd0242edf9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ee387be42745f7a103477d76dfc9b08d

    SHA1

    937417351636d907feccaaf7902f28e4d8325c6c

    SHA256

    f92066f3f10bb3415dfa78092c46dbe75d0a313d2f1f183da5a7d16681fcac32

    SHA512

    67afc4036d4513bcbba883153f6f919d6d4837b3a3faab8f9b8e2b359720859b4097bd2764c8786e948e2e4f6c257c6e788e0cee2f89f06e35540ffa04b45e89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b93e1a71d2e5924f719232f63bd4fe99

    SHA1

    b726927e7b521a86e92731d810d769212601d8bf

    SHA256

    7ebb96977b336b9f05f764922c1c0e459ab1b695f24ba22c7c4b5da0209eb898

    SHA512

    4cc0dd62abcfdd4b83cd9c30888b3bf8cc843d95dca2f13bf498a4974bf89d2a36505805989793cc7dfd5511a89248f606eb53ccf8e3ea5e97c94e122d5d7efd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c9a44d9e324f0905be36cae1eaf1c44e

    SHA1

    95f661f30c4661fee33137c43976c31dd3e374f7

    SHA256

    892456a3eee794b97d499cfa8cf8fdbd4fe18d6941f8f4547bf34d475ca24344

    SHA512

    b8baafd62c01b8eacd02afab84a345d29d933c4a5b642cb43f1a9fceb227d983a20b93f83783ce874c1b2f823f4bab90e7b79b3166e76377be832c7246a561ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7183a26719630673bb6ae260a838f680

    SHA1

    f2b6a4fed9d844c799ecb58196d2de96ffc426d4

    SHA256

    ab5a5126573724b663e61693032a55d90d933ac4b7b5b02e4d1c203e68c41a2b

    SHA512

    c1410b848141f8db14d3ead1b7adf60900f8bc5d1bb4ba3df9cebcb605c6844d6e976f6463255a8b8eeab86e07cb1260da546088d20edf3bc2425ff457b65c8b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\upshrink[1].htm

    Filesize

    706B

    MD5

    67f3a5933c17b3ab044826d3927d0ba9

    SHA1

    5957076d09bacaa6db8ddc832b4fd87ed8f05f8a

    SHA256

    97e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64

    SHA512

    03ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e

  • C:\Users\Admin\AppData\Local\Temp\CabF26C.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarF379.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06