Analysis

  • max time kernel
    119s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-03-2024 13:22

General

  • Target

    b4cbdab1b7b741b18a05e05d9a36b5ec.html

  • Size

    12KB

  • MD5

    b4cbdab1b7b741b18a05e05d9a36b5ec

  • SHA1

    10c918ec5398d100e94a47d5b155a25bf40a4aa9

  • SHA256

    e943d5a78e8e7c40fdd5779498c76e5b76d380e7b50e6cc0744c7e28f497af07

  • SHA512

    2f66ee577fa18443d77190e060905e00fc86548088e731383b728a16b7d00262049284fe16d7a52c107085af09111abfe1a3aa45a7e38f5914ce881652e9e052

  • SSDEEP

    192:2VklIsr0KXyJNVCIN5q/8k/w1wvqVkZEBbZ7np0qRe01LauBuLbdU8d:sklIcwV1jqZ/gYEBbZ7np0qRe0LaguLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4cbdab1b7b741b18a05e05d9a36b5ec.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1404 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2421ec2f84c1a8c0aebeacb17969f838

    SHA1

    523224fcc282b24509988981ecb594e06ceeab8f

    SHA256

    ab3a8e5fc9ad2958fe9bf605e0270825f4cc28a64cdca709415a2a94136e56b4

    SHA512

    06c39b99514ca3e2657748bf7deb42ef396a1b363774cce819920d4654b6ca257a4ffe556bbd9a01221eb784cbe25bbf0bc8245a4b06ae06dbe73958d28ca9cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e2f3f6b3850e9e09b8549a392e563af7

    SHA1

    696bfdc19a86cbb76269294e4aa06ae57f456873

    SHA256

    55f81fcba8c7eb18eaf983510ec1e159bdc19cd813f66788a37efa8d46944501

    SHA512

    2742ee2525ec6c3566ee4d7d5a32b1edda38bd027cc90c2022514303aa9f3a9d4f078ad0d706f6cdf53db47e0479e181cde904b72e22ddd3d9a981e898579865

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6f7d077afb2a5df98e73f840b1ed63b6

    SHA1

    b8642f1b747701a54ecf3b24c2babfb3a650ee5a

    SHA256

    8537ed0ee6b7f74487cb638474d86423e90e0220642cfdf5d11290e9fdbc89ae

    SHA512

    fa0f5912a98f0f36a28f6f27d3cfe3aeab3bccc5f756e68a23dbadebbf33bdb91647b176e05ab51bc4a6e1056c080807d94bbeddf3ec588476ca1288a11aef0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5d6e367385a6764ab3f738084f3f1a21

    SHA1

    8890171a310241f0c176b866da9f058b330c78a8

    SHA256

    3714f2336c3dda98d00ea10149f6e146012ddcf688b2def42542b086410eec3f

    SHA512

    6988deae81204c8edbcaac346ac176125acff753bd8f9cb356267eed8313c42f1b2bd89bf8ec20cb0d1c278c65d5a9857e035185a35ab731d1716b7e9cf78c93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    062ebebce7141b9b86d4856ae6fbe8a2

    SHA1

    df830e2b4cece4c0135dbe95a5d15cf9af484436

    SHA256

    db73b0f26bb9d562b7a4787eb26a10ae6489c9f3fcc2022ce60dd1061b3a0f47

    SHA512

    744bdbc1eaf80538ee7d699b0abd04816bb470aa6d8bd84c1c103aebbef9db8a6769d3911b6290000228220ba1c298743619023575427158efb237ca0286ace0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7a62413f893810f84dd6d477a8343cf

    SHA1

    7e6afc5672a9b3185e02de6dd0ae098fd4348aba

    SHA256

    06fc59d77b0e7d1c6b026dc6715bbfe6479ea229d3512b52e74120f4ec79be10

    SHA512

    bb765425fa1f806d1c753ff7449cb5c44a5a8ad6e318a5e88e1ecb9cec8f6b334c6468747ca08f4740111ae410bd90a427124343cfca0146c30690d3c3d1a147

  • C:\Users\Admin\AppData\Local\Temp\Cab6644.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6928.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63