Analysis

  • max time kernel
    147s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    07-03-2024 10:59

General

  • Target

    b89306538d919d9042cbf2569b44f60d.html

  • Size

    75KB

  • MD5

    b89306538d919d9042cbf2569b44f60d

  • SHA1

    5fd2cac8b9d7f9727544bd02e478e10c29a689ac

  • SHA256

    452e9faaa536fb24a81d6995f4f7c8e5751c24da9d42ddc1ebeef6d7c5ee8f76

  • SHA512

    b552f571ab3282aa89c4f7e58692b0ebf5bd4459d4b8679179fade0a1bdb72a4d688fe41b4acb2538bbf8025e335795ff108d1bba7d8c29b4631475e8197eb75

  • SSDEEP

    1536:Im0QpYd/QnSK/OQFXWBFTFEFIUa60AVYtY9tQHpPqoI75vGhNRKuZ4Nid:cQpYd/QZ/OZBk23NRKuZ4Nid

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b89306538d919d9042cbf2569b44f60d.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2ffbbe3eed6dd2e781339f0a7cefcd27

    SHA1

    7c0b10ae60d4372961e9250eff14d77fba74236f

    SHA256

    2afa5fdf014d86885a3fff5927939ea97983f91309930cb79242380b030f6460

    SHA512

    9ffcf04878c6f09232a2123ac62522196e4f94d169267db4c2c5ef8789b51c024426740ebea24ec342219fe08f06e3235b6e4c9673fa54f997a8d130a77cb99a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    603f93c659a0e4ec9b20c2f80b631ce7

    SHA1

    6af46bee1e7f36a3b02a5c6cc225356bb6b3a792

    SHA256

    349df1bb738bddf7130019652747917149ff1df4fb8f8d168cae566e0e865278

    SHA512

    81910dbb1fea7818d8d791f8883918c56eaaa0f06333cbc2a13cf16164c81e5127970d5dfc2bf21ffed744d6186e8a64c56157179ed6afee16f73ae477d6358d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07fa3c8d55a006f2a0c41986729d07d5

    SHA1

    07c1877e734c743f73b3dc456c2605fcacdd47fe

    SHA256

    2b63962f7738a992f74168bd99f46e439f00bcfd8e7dc471c6d4e644405841de

    SHA512

    b95b29d03b082621fdef324d2d052fc42e28a998a8bb98d90b8fc4d4551a04eb63ec94657a1eaaa65a3c2fa448bc4d2a4334554356df06192ffafe639b60d51c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67139842865009753366dac27288c613

    SHA1

    ab871bfe2e30e5e10bee9251fd77f8a247081164

    SHA256

    101ec6f3235bf38633c8f775f5c7b47880d63b85713743137481d4b195bbfed1

    SHA512

    35ae65f3c3179a13f25f11840dee919d8a242193d79b282863533c42c2db3c0f9f7f14bb410f32b05ddb2cc2a54d698da2d71b784fe075546b3dca276e406277

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\673IEUYT\recaptcha__en[1].js

    Filesize

    489KB

    MD5

    d52ac252287f3b65932054857f7c26a7

    SHA1

    940b62eae6fb008d6f15dfb7aaf6fb125dba1fec

    SHA256

    4c06e93049378bf0cdbbe5d3a1d0c302ac2d35faec13623ad812ee41495a2a57

    SHA512

    c08ff9d988aea4c318647c79ae8ca9413b6f226f0efbdab1cdd55ec04b6760812716ff27e0ee86941e8a654d39cddd56251d8392a0ac2c4c8839f27853556154

  • C:\Users\Admin\AppData\Local\Temp\Cab13CF.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar13D2.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar1732.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63