Analysis

  • max time kernel
    134s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 07:02

General

  • Target

    52da5812836b9a7442537f4f06084020.html

  • Size

    4KB

  • MD5

    52da5812836b9a7442537f4f06084020

  • SHA1

    1c3484cbcbf156025a9ac3401030860f124ad554

  • SHA256

    cad898407073e586e657fe5542fe0d13255462737d912ad2b6a442e7091d16c4

  • SHA512

    98932ed309cfed88e83690066bcc0319595030c411cca97472ccf7efbc97ce506c7d73504df46f84886b8e9050ccf4159331857d1b16b0119a6d2f99226a8c00

  • SSDEEP

    96:SdyjJtZdyeKncJTTJnJutbVRAnbgphZ7iHSA4Aia4q6ScSAkXfwBdeLnAZE2:Sc1tnyhn4TFJuegphZ7iHSYvUdcz2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52da5812836b9a7442537f4f06084020.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2716

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6ae4b81fffbc1a3fb6c7b406c7497e59

          SHA1

          2b05e2d9e591f280ba19a7a619801fa35abadbac

          SHA256

          8c30a55a18d7585c0acf002be5b7334eed8284d096c6b691433f6e89295511fa

          SHA512

          809cf0f887d6085c3a07993792419b0e92382e55c09ddc2cb76161574267a2355663c43a9315a65dbab6639d6b95e3438a5a3c179994dfedfd16d959cce3f215

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          040fae0c95cfc8144ec734ad005c7ccb

          SHA1

          b89afd850a6db64de602e34473fae8abc28dca72

          SHA256

          c19c61134c26271c9cc04e16ecbbd0f0fcf1b3dae9abf04d6410b606c255f6b4

          SHA512

          79dfb0e77cd76b2f70a42f9b7c155b6f68769f38602efd55dad694830c5befa6d1f469f108c8fd58c0ffc9f6ccf0fad11f58f63266c534a87153fddbb7d115de

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          402bf997253b46fd5dd908b51369d321

          SHA1

          d635cf4898f10d0fc7ab51fe652ee9b50e6ebd78

          SHA256

          5fb91aa6ff6ad1b0273eac7d0bfcbaff9e913d543c51e3310aa67c4686877450

          SHA512

          f95e180d70eff5f82bc6f1bca6f0da2ab6cd9a11eb5942651e74db76eb71b6382c2f59b3c7ff6760b0e47304ed92432cd4194edcc34aadb22aac2a24dc220e5a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2f7f00e1c188bbabaa6eff7550ca06c2

          SHA1

          9cdb8e66c7bb5d11b78b1ec2bf820e46d4c97259

          SHA256

          6910f5ea90fc78cda5475dcc4279e6cf1315605e8a70a79055ac2753483dfb08

          SHA512

          49d7cf6f61ce913020eba792f85460d2b8aa71785d225ed1120c04b579b26eeaea30bf3e585cc0e70039b61eaa0413bdd1c69d372833c9f5a9710162c11b078a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e12f4eb512bd76652894f977f97386b8

          SHA1

          1b22cd4fd975dae648f79c42b46dedba58e26151

          SHA256

          56aeda3d71c48dfd96c8a7bd36fc9abbebc7ec536f09a8bacc446f69d7b953d1

          SHA512

          ba6fe5ab3bc9d5d29d8c1fc0c8c8112efba4dee3c0073b91842634727c6723e1d51ef8352b99923da43cd1ca9784a5ce374d8c3998bbb3d3ecb0a6502a349107

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e6125b642a258c80ad20fbe811e54248

          SHA1

          af9681b82f5130320acb7f6d992ef7dde307bdc8

          SHA256

          0b00e563c92ac56b8020c67f6d8549fba399005739382e4b1bc435b4f46a4c5b

          SHA512

          813246a376634ea09f65cfb6fd68c920a85408254c57b1b49320c9a07f51215dbd2b09d185627ea072b6b28019b2e01cd07013968c1a13a614400c174c86bc9a

        • C:\Users\Admin\AppData\Local\Temp\Cab407D.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar41C7.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06