Analysis

  • max time kernel
    133s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2024 11:37

General

  • Target

    536904ad7ac130e7768decfd759bca95.html

  • Size

    17KB

  • MD5

    536904ad7ac130e7768decfd759bca95

  • SHA1

    337470efd27757806d647f2caaf086621fa0961c

  • SHA256

    dce7090691c81e1a2d28ae9e71c4d1aae146397dc956a2c34ca3741ff9e0a28e

  • SHA512

    57370362a24356d3f5087b1d020abfa52f74ff1500527ff569b743fcda4ace57f61c28393dc2ebd6b5667ede70607ef0a0b6a31adafac1ce7220acecb0161587

  • SSDEEP

    192:31vlIsr7dOtI4inGTHrxVFEdJHZbAdY3Gf8k/w1wvqP1pgOXuBuLbdU8d:FvlIc8tI4inGTHgHZbYD/gbpgOXguLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\536904ad7ac130e7768decfd759bca95.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a0d9fe69cda00db18cdb1393c8e14a22

    SHA1

    236139ad6e6a18580c789a61d659f7e5769b939e

    SHA256

    922009cbb6b25d6e3217d917a3d38b90ba5638e7959e2e7ad71a49e6bd16a87a

    SHA512

    2b5d4c0420c0268b85495e2a8e37e45b6c1e9fef496519699d31ed9eaa6cf82a381e53304fae93356cb0f9eeeea438c90d51d3b16067dfba90224fca81461cbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7c367021bb6837240b9faf7081eae205

    SHA1

    2833026c2f46cb77e76e7e5c05f237a58dd19c8e

    SHA256

    e0636322c974a2c721acb0ecc17dd2c94127cc46d04f9abc1adaff8a81fd8aeb

    SHA512

    dfaab9994b4ee04449643657c79c791d11b4408fe318b495e9f3f026a55f557e3b2caf0b2a739fa9ef51c2a61c9f970c47c6ef120ec70be377ea245ddfe77d8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    638b20d18b5b1f214d7b3d0837fd4754

    SHA1

    2adc0e33f72bb783f24a97322cd9cc064fe4b88c

    SHA256

    88ce19ceba628067ceea76a95bf4497eebd20b33bebe52d34e268a83051f54b3

    SHA512

    c78aa87e6e821ceb2cad72657dec54928624553727869ef233f0a6d0c2a01cca4f21f11418382d6746f6cf418f62b6b3651aa6720b22caa0cb53aa59be7d544b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0d335a87821d8dd63278f18da4047241

    SHA1

    a7a2b0e061a2b0dd92d5cff923a1e18ac19f7f98

    SHA256

    26a8d1d0ac4995346490d564e95f9cc1a0ced808289245987af174f11dc950e7

    SHA512

    e32c10cba8b3fcc9d9e5ce1b2a922c257a371e93c0b1301b380c53ac84e1670ed600b0d9fb8345f47f713fdf5a342f991f03e5a339e872efa96b6aeb54b577d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    70a9b6a4e4483a51fc2aeb52fa0e1248

    SHA1

    0b90b91ec890ea5bc2c89fa4ddc90fb26079be53

    SHA256

    ff28d568894892117f521c52ba280600b198b510575ce12da9eb43bdc385af5c

    SHA512

    c845fcf99fb3e14a023e69b246c677942159f3e35b5f7d026c86bedf6155f6b530f8da9129c745119efe23b2a3cea947d1b590eaae92154859e3ca9fad2583c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cde4641ab2d722a8657238b03f162b37

    SHA1

    6684f27f9eaa63cb236d8b2f775365b2fb1dac58

    SHA256

    48a371a6f7827c048422447d567893994890c10feb1b56c487790e7ce237f85c

    SHA512

    5e31f6c188067451b326bbfd33eff18a9c00c34659ff5c3d91b3bf3c11d0882d88f6a1da74e3cd28d750a944035b0e33ceb643766ab5770b35933e4725ed9655

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    b6212fa3725fb253d7b3192d09729624

    SHA1

    d7937d3c350722d95ec147d6fa5c8755b6973f88

    SHA256

    3ab14dbbfa21fcf11bf551ac43e001cef45d050fdeb4d70402dfac553ee4e47d

    SHA512

    1f7bd58291d95684ee0bd47f97ef9816cbfccab56fcbc9e785b66983e03142d0fb4f29ebe716b690fabb632410ef0afa416ca1c87631b90c349fa62b499f399e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Temp\TarFD48.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06