Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2024 15:18

General

  • Target

    8f7bedf1224ce8946545eb2eb06da5c3.html

  • Size

    97KB

  • MD5

    8f7bedf1224ce8946545eb2eb06da5c3

  • SHA1

    f43ea110f809fa98734ea2d9b7ffe53c2485c305

  • SHA256

    c524cf92c9d3f91e100a4da3b6579654a1e61b57f23b553e11deb0d141fd49af

  • SHA512

    42ed2d4c8a3945aec631c7fd952734aa26e1efe1e4f24d6b3423e3e5dbcbb4ad544c56e5524f89f17a2a6cc3a47322d6deed368b235d134df00916aa63215af0

  • SSDEEP

    3072:drNyl1G+dayempGCeNSLwmgHMEyg0khe5CVSN/WUDwb0AxhRN:JCeCwmgHMED

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8f7bedf1224ce8946545eb2eb06da5c3.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e56452a1da0c12aeaed3443ee4db9bce

    SHA1

    751004fd70dc2de11a623fc63346c7cb85d34bfb

    SHA256

    5e5dcb68883811674caa553e3d531fcd00316999f78068e095f61ac28662d422

    SHA512

    b22e8ee17626b4baf28abb5431378d9eb8b90450b101b5e3ba66215cd9985ae95b4e6d536433c7f418cbe93b261eae27375c21824bd5c845f00cf2d939df694b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e1d616272f72521954c47b8212355b77

    SHA1

    4e133e6c19c8610ff99c38f7298f80d528971fab

    SHA256

    f99b8a18e8f88bb960673e887127efdc503192a5207438e071008be31092e8ee

    SHA512

    e70e9c21b5a98718b0cb1b3fa8ef5054fba8ed121e5ee74df1bc0d6a9e98ba37bd2148959e60f4d3e3c3cb6fede9040a261291418597945ff371bec5b5f73ef8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ed73c5a621d0c5172438b9f40be26f6

    SHA1

    079278cd5a05a2f6d141f453d48829bc2a81db72

    SHA256

    bf6080fc780488ea9c320d93f730135b2551c879fdd67a9280c80470652b59e7

    SHA512

    a15b4caf3da92e07400e414f669dee5085872529d997286923475b506d086426f7fff10cb9be52c7104932ef448b3d21421d9965da2dc7f7b0eb3f630a359906

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92efd58cce82af36ee5a344c4eceee9c

    SHA1

    3db93c77d28af8648ad4d960ff4477da2d3d01f8

    SHA256

    6daf470d17b7fa70762fe5fdb37111fbf9c1085bd697ca588f6f2a0363c84589

    SHA512

    e3070fd33867dea6a816ca7e25d5883c90e65aa6d3eea068f9bd0a42cc45ddd55f5a5ae4df24b494578fff85fbfa3182f5306c33dc32704775ebbb9bd6c5c5de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b1696d78538b6e603eaa4cc68cd4a5bc

    SHA1

    2f8e38213897d423c8567a259a2ffd52b660cd44

    SHA256

    33330a5b4f089dd304eaab061b61e887f0ee85d27f0ffc7bc697e8c1969bf868

    SHA512

    9e111c9ebbcfa8fdf0a22f88c53f1a5840fc77dce65b85814f44645fcaf54f43605f3f9c72600a9df7cd3d5205635a5bd3c3c0f2c95eb8f0a8379a41d1d139e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7689eb35f05783ee7e72d095e45d74ce

    SHA1

    8a2997987fcfde188e70398becaf6e1c339b9241

    SHA256

    f3bd7fea63290c497df0a0462b9aa65456f498e42b091cac7221eb777c974940

    SHA512

    407fb6357506df4621864b0e62b3649aed3d4b3cb2db4793added1d310a4b0602bc5bd30b920aa31022aca3933465903bfa32c394cd337ef6255bad0a4f3c892

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5dd5d275815f619082c890a62e021b75

    SHA1

    7300ebc0534d5a65b7865da3063e9009752b8c5c

    SHA256

    651bfebb1f8415b9890689c970ac9998d5c0f667c7e0658bec90929f03c40234

    SHA512

    2b679cbec44c10519808c762bf753e0b0592b798b929323e37af0e797ff6cf9fefc373ab6946ef43fb47c5ee237fd1b2c055a04426ddc1df036f6077f662e775

  • C:\Users\Admin\AppData\Local\Temp\Cab53BD.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar544D.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06