Analysis

  • max time kernel
    122s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2024 15:32

General

  • Target

    5912a4dd0f25158b21176dbc094edd78.html

  • Size

    226KB

  • MD5

    5912a4dd0f25158b21176dbc094edd78

  • SHA1

    0dc5ff507e965a2ab47bd2a9038da7c19ca8134e

  • SHA256

    ecbe46a9d222fba17cd0c52fb3da34ec9693c3c1acaa58952c16e30540de4234

  • SHA512

    949d1f047fbe38cecc8a6e70ade1a567427afd9a8be23ff527e893ec892615a756bce66c5fcf21babfd5c5b18e9943f72f857e8e0a59570874cf7b1245bf6dc5

  • SSDEEP

    3072:S0RyfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:S0UsMYod+X3oI+YLsMYod+X3oI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5912a4dd0f25158b21176dbc094edd78.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d18c49d9f96a832d3ac95bf09b2ea2ce

    SHA1

    2a742e0357070ad69c9e9305f34a4b201159da20

    SHA256

    725e1232803d6c2538f1a7e4bd2ce087bad9e469b2db831c45836e3af2048ca3

    SHA512

    02dc0ced5b07301703b28a525203a18b48e0870a79e2dd8d5f3e3d9012980a206d92f5267030616ea8233292583dd3aae9bba91f2631cb82794c021fa616d3f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf6714521e6fe5f2f9e7dafb2f66fa49

    SHA1

    150fbd6fdd8c8e5b7d52ccded3374d964c41b8a6

    SHA256

    cf189d9d1b1e3b463f4d1ff5f0da10e11792d5bdac977154ec8f04acd7c11d7c

    SHA512

    7bcf8744167fd1b6204cb811ce8b278c9c51d233a3458b08ddbecc5d61bdfdcc97a1e2a82a73eb7ffab7d3b12d841808f22a17e45e42360ea783ab402fb6b07b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    48b3b16566dbebe974c1be853b052b6b

    SHA1

    4fa706694b4e3170affc59570a3dc29b38cd9674

    SHA256

    1a43e650e1e9ed51c2017212c761ec2117c78c380cb4fa6ded02bbc59fa37934

    SHA512

    d77232cf65278e612b1e2de4c3a1646aa615737cd50db299df1afd9c51bcace83baf916dfe88449b7996d383195a1c1ece02706c977624c4afa05f0f79a9caf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b72e6420f971d99cbf860dc1bfc0552a

    SHA1

    ba58a836881094e47d03549011f0e2f362d12aa1

    SHA256

    04c7d5695b5e849838f3543254e26bc29b6b5f7af2ecb2ebded50c2fe54a83ca

    SHA512

    0ef66de943266a7f823d1d9f49fd61a8bcf48d206e36ef8d427740e438f81fb9a35ecad13d79de5ca3a7c0ce014767541399a66a44704191a7ae0795982876e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3afc8a8ef948db2322773bfdc6826a31

    SHA1

    8f8d120c233a38e89bf6792c418f41b86f72755b

    SHA256

    1a0fbc8322a706b24b89ff56f28695bd5fbf2ffc24aa136ccef98b5d150f05a3

    SHA512

    b43093fa5d5232919f1a975e356952d97e10d7042363e660cd5420367df702310b946da0e5b1c41b4530fd40da4b59fafdd0d4906180f8d3837f276946aae9e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b964bcefa00d7f343a07eb7588d02019

    SHA1

    23998564fb1bd20dc27dd09016bf7aa0847d40f6

    SHA256

    c0c7210be79273ad7c1067d2d54832c931fe7dabbd8eeca4b319928224fccf8b

    SHA512

    3169715e2109d0bea9cd7771a9368a87c7875a05dce0cd212da2605a84664fcc626bdf476ee83c7917ece3bf67933389a0c1731315d0ee017beb36d5d2691c4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    85a8d6ac8b46c715abbe5416aa512ece

    SHA1

    060ecaecd8e3dd8c80d434528499398766c689f2

    SHA256

    284cf72d6dc5cbd234c41b4e96f9fbaba66d418a0f377aba44fe3a5de0a19ae8

    SHA512

    e2de7e4aeb450a3fcc738a8f3a8c5156560d517e20125ac223ab5d45d9ab267f530b87553a0f1945095130f1c2970ba5d582b83cec131cbd4aa361ba5eb25721

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    48441c1a26d517ca3fb720840ae0fb70

    SHA1

    967ff16399ae9190332445f36f369840e1a363a6

    SHA256

    033d5a4d82a92348b7b29e036b4c0eac7047d5bce791b0c06f71e0152dde8379

    SHA512

    e9eb8a3f26b3131462e254b24b3a1a64ef04ab42a590856e31205c45aed3333e8c72ba4ac58fffcb1a7ee29d3f415a4e3977b44d021131754d568db4c2dbf3cf

  • C:\Users\Admin\AppData\Local\Temp\Cab64BE.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar65DB.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06