Analysis

  • max time kernel
    122s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 20:56

General

  • Target

    bcc901745dc968b3c9240748532d57e3.html

  • Size

    2KB

  • MD5

    bcc901745dc968b3c9240748532d57e3

  • SHA1

    e82d36dc0d01d72f1ba512743bc982eb418e0f52

  • SHA256

    ad412e835ff0b2bfbd431a61b52de39c07c41046ec8ed000310a599251f21461

  • SHA512

    2727d45a76e6eb77be97501c9752a3a6990fef134ff265465240c1328f06171676ccbf38c47206edbbbb4f4870d06837e9e0b2a53ddb03a72be7afeed54d33c9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bcc901745dc968b3c9240748532d57e3.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2368

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          67KB

          MD5

          753df6889fd7410a2e9fe333da83a429

          SHA1

          3c425f16e8267186061dd48ac1c77c122962456e

          SHA256

          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

          SHA512

          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          07dbb5c0e63ef5041dd01e6fd589fcf2

          SHA1

          e5fabb2a277ef22909fc8a685d1e62276e9642a6

          SHA256

          9a5bf5d4ff83fc58daf01fe50f64f07a7cca4a95d28057807a727e5c4f56d20b

          SHA512

          df49f1ae162dcb0da1f65f67aaf13f1526a7591d472f504eb5d606fbad1f2d5e93c3d189111566d2d05f9cbc0bddc6ff6e5efa1ce6e595560be29a37c02772cf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b10c145bbb7ec78f9bfa529cf0a73884

          SHA1

          881c19f744e38cbb24e5e15be67b1cc7d0191480

          SHA256

          2b4607acab5a8fa0ca970c0c155fe279953054040a00585a842ac36b9ddf9b87

          SHA512

          3550c0629ce329fae3f8996dab3c66083d53e8b3a6aee3d47220905f8d0e76f0117ad6a5805c7950ad658546a93666e3f5832bc9d92ed52deccaf88c7952e39d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e2217a1794110d9ec2b2d553af4821c4

          SHA1

          77a13a8266d645ba483af50bdba3fa4b5098608a

          SHA256

          d01b8ce515da5de7d2ceb568b48db07f670f112a793856fc1cba6f69aebe67cd

          SHA512

          ec7127d2ce28847a558d08b7a92f497ff9e9c93d72e9d34f571ded2db7ab08a4937bbe45591c28a0693728f57770a3cfbcbe84fdeaafa8ee8d3049f4565f4a60

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c75f937428ab09a88db463046aeb8bcd

          SHA1

          459c32b9c7652a33d54cded647476ba7e9b6e087

          SHA256

          493f8df3637b1d21781f0f30ab08429ec83f16b5a6f0e5a2ea83311ece24622d

          SHA512

          f1c50d43d9777c0fc7d0449fd56406207bf15a0cc756ffe0549c804f09bcc9a83ddbd0c9ca37c7e64e20657df650d1bad8c9250d12997c0af4482fd718aeb651

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          021c15ff3b208fce1f33924a21a80a16

          SHA1

          473c3535dce67cba57d4f0ce90103c2087d409f4

          SHA256

          b1eedd16c3cee7f07a056fcd086a82184de46b186543d081de3b126cfd836398

          SHA512

          0bf67cbf01bed39176faf731e72fae44e8f9b4bee40a4b649a8c81ee9123996409a2e9aa31f6585ae3a48934175c11cb5227049dc621dcb93cd20049a7dbfc4f

        • C:\Users\Admin\AppData\Local\Temp\Cab2A3D.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar30B9.tmp

          Filesize

          175KB

          MD5

          dd73cead4b93366cf3465c8cd32e2796

          SHA1

          74546226dfe9ceb8184651e920d1dbfb432b314e

          SHA256

          a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

          SHA512

          ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63