Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2024, 15:05

General

  • Target

    bb9054bac8bb3e08fc4d8dbe3280ea78.html

  • Size

    3KB

  • MD5

    bb9054bac8bb3e08fc4d8dbe3280ea78

  • SHA1

    07576af9e039905aaf318e5cf7e1d4544c20ae37

  • SHA256

    a24ea36c35174c107236ea6df4da29d838c809cc304dd662aedcdc79ecd0f06c

  • SHA512

    7d066907d87ccba00501d0f260768a8ad8970cb9789f6fa7cc92546ef78db83975f38ba1e67fc5709d708e33431a4c26144d2564e26e1fd67613c4ad79f97737

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bb9054bac8bb3e08fc4d8dbe3280ea78.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    25038180c81e1eb713f625d6c18e6631

    SHA1

    dfbf84d389ec31542fe5c445a02621d3d4502f0f

    SHA256

    16b3aaa0677836bd5a67d2e14aee811a05c33fa5a4c809ed31f592127cf3086a

    SHA512

    66fdfcd8838a3304645e48f7ab7e274bb26ef78cfe9e017ee9f28668624d9162a2e96cbfefd7727ccd4d443fafeeacb9489ca5c0400765f01aed7fdf915b811e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    813ce5c77951745b691ce43ad061f6ac

    SHA1

    9ce8110a4b510f91e76abfbd30617611c402bc49

    SHA256

    74dcd26d5ec8680d5b86339bed3edd551c3645a5f40b422cdb9739682a0fc819

    SHA512

    8bae1ee00d9ccc12e5ad9dc4baa61b95817bfc3d0fd35dac03f7d3f500cacb21f6dbe1527f51a59583e7ed2ed2be0e25f9a050fcc1458ac8c50423389ad4bf4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1c771189e7a4b05091d047814a3c2b64

    SHA1

    9218a95bca722138e3de97595ecfa198351d70e9

    SHA256

    6140a9fc9964e10870747ffdbbe3cab9b38d91a5c46112ea2edc7f979ae102d0

    SHA512

    d02e6f3c6c7cf1e9e781ce69fb984fd83bb7bd8d88d8fe5d51040a31ad95059df7b5945736b3625a6632af84069dee97a4e3e9623df8e3a525733c53fce1f36d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    90c22b717c4e3ac87a60e51dab4cbb06

    SHA1

    1d51d273d70b561ef49963bcefaff345f4a42c31

    SHA256

    a5574ece798d6844b8eb442433dad7c355c826bcc11cfb78f988c9622edccc14

    SHA512

    83492de1d89d9a360661ce2fb4cad3575a0dba2093656e570f662d461a521b12f82e670d74ad98edcd2453cd841f6361fe93a25f08cd70e9e7bbdf20f8de7409

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a5ce20d11e6c193c6a22c81dacefdd2b

    SHA1

    402d1f80b977e18a7ddb247610d75c3d3c179031

    SHA256

    253c7663000647c069091af2ed829a687cf91f95d77eb310466a367ccfe638b1

    SHA512

    4072a37841e46a0673dd2863b250bbffbe082acb2a004cab5fccf0d37faded6a68864245456f9fed2c5d313f6b055133993e2b56a731ce3168a2f2e4a95eecec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1727aa1aa611c3ddee3e4e4983f11f62

    SHA1

    b35555addf62be4e3ee670c1a0b060fe47862b09

    SHA256

    aebaf01b4752ac20843bb9e0c878be9ffeaaf6a6af26dda24fa7f1ac9904001b

    SHA512

    316ac0d2024a0f189aefc86efe3f892b2620fc926da35b1d00bffb1fa73f494be6f04461ef1f378466f1ce2583bdb52dab843747b0f5aa837cceece2076aa6d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    23b3dec304fc32d7b61484f48bbe087d

    SHA1

    5b3392dbb7a90a313ef982db70ddfb4d69a75f0c

    SHA256

    8d4fb1dd1dddaae4c16c273501fa51b9bd19814861de015a32ddddd606f88c61

    SHA512

    566f5e6398a66363accb20a854a6d999a9cf8002a2df366010990510e6e579488a8f07b539e8dfe2771099eac5f27b1aefd98a8ae2f51463187998821d92d17c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b7186cc5e9d9a697c40290f4fb032ad

    SHA1

    aed5b058fe95108ee0fa4b7e0e09b4d10035368e

    SHA256

    5155b3d345b8524a1e4d2ba3bb8d357a3092c4751f47957702f9289f8e1ddc22

    SHA512

    b8155db89e88483c782b50c7e62cab75a98091ffae0f89ce69852f8dc7bbfbd1ffa3863affa93ee4c56ea03e85b1221b565df588a4bddddc46e201ff730fcfb2

  • C:\Users\Admin\AppData\Local\Temp\CabE3DB.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarE623.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63