Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 15:48

General

  • Target

    7d5fa5a4fbedb0048cb838a50a94ff99.html

  • Size

    291KB

  • MD5

    7d5fa5a4fbedb0048cb838a50a94ff99

  • SHA1

    6f5d310fcdcabc4efc5cabd413d39ec247a3d3ba

  • SHA256

    f166a2a2caf07ff95b49c7312a937567346fcb8117007e659b21a597d0d47b50

  • SHA512

    426bc8b14f889671a07998037ed40df2b03e2c8e2823d12aa1d0ae88ae0158f26d5e723e8a771adf48e85e990442a5381749b20ac379ed962b2bf2380d72dea1

  • SSDEEP

    3072:gde2tOGYiNzTjEATTqSOUD0bUwHmE4UEjftsb:gd59jyb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d5fa5a4fbedb0048cb838a50a94ff99.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    23c885d47568a0c8ec78d6dcc163d3e6

    SHA1

    5784bd843fecdfcdfdd6c213c092c65613d1f6b4

    SHA256

    c682f97f831992d9fc18392f30e050457a49b6e15de26a1af4459541c2866d80

    SHA512

    329f656e73d533712901b9dd168555670fa8ca2d89aaffbc5e446f734af2eb409c54cbbcfc72b9173a65d413bafc4f74c47d6985ce15767890719c36f6e15fa1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    425b3663310cdd4a22a0bdd900a94dc1

    SHA1

    212d18b3595ca4d3559866e444aa17b00864653e

    SHA256

    812fe7447af055fd1243417076b2ea81bed77ea1fee185d1a650419ef01d1f21

    SHA512

    506ff397bc36c1e91e2eecefbf901c7729d4f0b4929c381d72dde6dad784c976eee6b6d48c3e6db3e7197848022a0da4d10bcb21ffdd4a4dcebdf76cf6fc564c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\43O0UZKG\Frantic_4[1].htm

    Filesize

    166B

    MD5

    3ea1c8d079b38532a6e01a96216ba5e2

    SHA1

    598d3ff91d3e252f1e13df8cf0348b270ff2da3f

    SHA256

    87a9323ac85ce28867d5d7ce590c8f29b8d1a999961fca71bb33adef48683691

    SHA512

    cb4f800a735d5ec435844ac114a81ee6c4a429138119b97f2266edb87cf729f1a64662190d04917ce955b0bd3681610d49be42cd6782989ecd4b0d87ddf8a03a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G8X408WQ\swflash[1].cab

    Filesize

    225KB

    MD5

    b3e138191eeca0adcc05cb90bb4c76ff

    SHA1

    2d83b50b5992540e2150dfcaddd10f7c67633d2c

    SHA256

    eea074db3f86fed73a36d9e6c734af8080a4d2364e817eecd5cb37cb9ec9dc0b

    SHA512

    82b4c76201697d7d25f2e4f454aa0dd8d548cdfd3ebfa0dd91845536f74f470e57d66a73750c56409510d787ee2483839f799fef5d5a77972cd4435a157a21a4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GO8BH966\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee