Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 12:16

General

  • Target

    58e536dda34eb23cb578b41105f08067.html

  • Size

    35KB

  • MD5

    58e536dda34eb23cb578b41105f08067

  • SHA1

    2a32ccaade3b035d4c4f1aa91c9322fd5cb74077

  • SHA256

    e8eca3ffc3ad3eea374f482f1fd77c964352b9454918f62569bf18ff889cf154

  • SHA512

    457024123c13fbee7def30f787b1d6411112b7763298c574673f4df3bb7e6d75ccec692575abc558214ce86253ab474eced6edd226688e26e54b644cb0814d5a

  • SSDEEP

    192:uWfcTb5nXsNLnQjxn5Q/znQieaNnRnQOkEntBBnQTbnxnQKXCLAXskY3xP9YIDq4:gQ/gWzr7CzRtiHzoPK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\58e536dda34eb23cb578b41105f08067.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2080

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4f54ad2931c3b664efc1fe2df9417861

          SHA1

          0dea52fc5d5c4284786852e096695730a45c6507

          SHA256

          81e972c20c3879c42fdd77a300393c0b74b9f44a8ac5ec551ee913d2d2e003d7

          SHA512

          ec23dcbbc41ce23986453738ac89f5b9b48bbccde3193cd24447e4843b71d21c6d86ee42629f598fbd5511558e1d787d921bcfb0a30796d4d41c5fdcc227002a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          79dbcdb6244a52828e99316f67ffa9fd

          SHA1

          97b3f3e3ece7b280edaf017e0fc4ca2b426283af

          SHA256

          2773c2e9aaeba24b281d7beb0d744325bc4158804c644f76b5b8dbd2f6740292

          SHA512

          c609195c75ee6f3dd24aedddd98fd6981acbc46e8f157ec181136bef472bfbae6c9f138d2423d9849c5b6bd69beb23cab1c987c3065f545404c5086fd0a3e9bf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4f36e2b332dc82ab5b058be1fc4d4368

          SHA1

          de87261c7550a77069e516fc0db0cea6f8b5de29

          SHA256

          913bd34fa9f7f0598ea7a1ff08f1207da510b755b5106043c5c78549d8ad689c

          SHA512

          4e6aa0ec6a875a43c049d8c7a9065bf68470edbc80280bc6b30b99cb08af15fb9ec808da9e4ffbb8cb28073011741d11737d83b2a2ee1cfa9bb5145f0a58e2d8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6432c46aa39beaf1b9bb65d7709efb0a

          SHA1

          0a69e63a934dd2f83b0b223995ba391ac3a8dbb2

          SHA256

          7fd72f139c0d1ea42be7d1f60326f2b118476d15210903bd396a99928d36a988

          SHA512

          dada3d9489952fea09ff24f8c1914760d0a9ac245143b61ccb9055f3c4caee26558a058a2d6aa2afc81e677fa8ffd0f624e9ea0ed360e79c3e88e4e1a5b96e34

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          19ade91b595a05993b4cc3bfdd12a57a

          SHA1

          c6f6beb1f20666368bd69f414508611b87fd8fb7

          SHA256

          28a1e0297f5c0b4514d97a7fc215d2f21d9663539695a06b7bd628d5d80151f1

          SHA512

          8260bb7965a57f20c5f6876fbf06e94fce7513c9e1b8b5f1900bee7f9b0d3cbdf1a92c9029c56443171a44901f26266597318c1f07696f70499a63d55e5da267

        • C:\Users\Admin\AppData\Local\Temp\Cab7EF.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\TarC93.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06