Analysis

  • max time kernel
    122s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2024, 10:28

General

  • Target

    be6019c7d87fb89cf5b745af35c7a720.html

  • Size

    6KB

  • MD5

    be6019c7d87fb89cf5b745af35c7a720

  • SHA1

    d68c1b328b21382bca80e07852cac98fcf02ad9e

  • SHA256

    e33621a3226bd805b99928b5d958b8871266332c3f56f468853b68bf7b6cdfc9

  • SHA512

    a29c30965d4c3449dfe07077a32a0a1533eeaea7af45a3d03ef11ec88c9a17c9f426bd077479d36787b98805f8e7ce923cd85bbbdc15eaf03f13c25f335a075c

  • SSDEEP

    96:uzVs+ux799LLY1k9o84d12ef7CSTUSV/6/NcEZ7ru7f:csz799AYS/Z4Nb76f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be6019c7d87fb89cf5b745af35c7a720.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b2c16762ac7d7d4d87da3889001e1e6

    SHA1

    e62aab7184c52f911dc127db1d3867c7452b0e7d

    SHA256

    e1f5281125007f17c2c1ae2bb1884e606f74586419a9b94749a8c1022bbdab65

    SHA512

    5268f2f6a6f62dc951464c035a6be05a445a180449e3dedb7ee85798f9fbd92dc9d9d275031970166afa17edeb89d4c7b92d34ee5c1a05736800f0350a9be80e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e80d46552ef4ec252f7f74a0160fa150

    SHA1

    5c433ad9ae3252f0e0797072322bdfc2cb69bf67

    SHA256

    34cc6f478bf2831ecff0802c6fa14c76c98e9a04ce6218f2269b4030dfb4822e

    SHA512

    21a911496ed651ff57d12380fdcbb3a627b211cffa08721ec7d83ba720a117ebd95bbf3f6f81173a69389e4c2dab89794c6d735169c541f675522a67c7b4dd54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a622bba513a51974ebe84dfcc524825

    SHA1

    86fbce6703d1cf1e89d627d8eb4c6062a68f9f00

    SHA256

    677abbff381b10c039d7896fd18279323e7a78fceb6df33dd7300474a22012b4

    SHA512

    bd89a93c026e0bd6b38c284dba88aab044c51abebacd6e23a8747beafc8f9de125aaf7268511f564e5861e7cfec93f873829db4941e665ec73549c39a4bc551f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f4e6e7c4d6aea18dbf6fd465e81025c

    SHA1

    8ec5fc49cd23d17ac97e4abdf7c23ff36bdaaa78

    SHA256

    8ccefaf554e1afd2dba8c1095c3ee01c26b3172d8282e26ef65a346e72d9cb2b

    SHA512

    fe01d2fdf550cfbd740f8827a9c321a16b47cdfb63449182075c2faa8c81336c9bd14df199257061ccff184f8d7f28824ffbf04115cdb2404ef087e638fbec2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4ab28b4e1554000c81ec7a88e9b857b0

    SHA1

    388ebd823bb2e1885832b7acec5f9837c09f19cc

    SHA256

    6ae0e559f497d6ed9779d7d99314c0874692ea3756152e2f4ba2dc6fd044339b

    SHA512

    b63de211bc9b1a2473872e47505630397554bed0d1e0e29d3d7785e1a32f22d2c0ae8a413de4ab833b4a111d13025cc59ecd8a8fcd3a5eeb3d989780299de949

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc5b639a07ee100ad9b80a8d9a5d5c6d

    SHA1

    78c54f6b4f74dd6179bd3334fe8120cf0bbf3e31

    SHA256

    d8c126a6bb100db9b9f40f8b88f38201a0fff4cb3d3db5fc80f9fdaf21e94944

    SHA512

    c37e8b5df6102d445dcbb8b5c28cc627d3f8c3bbf2f5a24aca7daa1053438a73695a4e8654b2b21886137242f8d2d1642fbf8808a0c9de75c901bc0172b096f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ec636841dae3d90dbd90978cc01feacf

    SHA1

    26bebf1dced052de0b83b7cf4b37d7e7349bbbf7

    SHA256

    5cdb5cedd0d771e0b0fd049f105d0c6c0c9b3678a5030655220e6a4afb49f598

    SHA512

    0de3267b12d680a14b32ecfff4b94c386757e374b049f6d00d798eceda5511ba446e3be2358e373df0914cc36e07d41e3efacdfd6c2f60648658b127f2d3a807

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    89eb8026b37ef0d35c01376e3f19bbc5

    SHA1

    2d2016bfe857e094c668263507f6c5bc908df511

    SHA256

    96c01b54cef5836c61e6fbaa916837ff825ec935c6163bd0db64f8058b4a15e1

    SHA512

    15d253807fd5a8744c4cea8ab72d883c25bedfa7eec0153030e80d10041f022f147fd28140a15265219f05af74c68c49871ac988843be4572ec3177087ecbe97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e3c52e16a4cb8dc0dcf5ad17eabf143a

    SHA1

    38bbba2af1b759ef589499d0b6e6e26c3ab1d2e0

    SHA256

    0a1a592be579b291fba4512f11665d7e321b03e336b97e2f6a02bf42c91f0d68

    SHA512

    a2bdedb19cdf81da6c6da5ca05d566dd235e4ac9235e83e18b1e83f8d7c900177c46ec68c6778b465f395390ea98bcf1c50aa7f1e9dc4244b6746a638b2b4c2b

  • C:\Users\Admin\AppData\Local\Temp\Cab1A56.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1D4B.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63