Analysis

  • max time kernel
    148s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-03-2024 13:04

General

  • Target

    bead0a447953c5ed7b1e458350f52559.html

  • Size

    32KB

  • MD5

    bead0a447953c5ed7b1e458350f52559

  • SHA1

    004eb573bea85895b9c65385b53143f966c8205d

  • SHA256

    ab8cb6b8c71aa7e98b790e9eb47897330000ea84336f260b42c9499c5b2383e9

  • SHA512

    31ba3ce8e850bdb8aade495a2feffc8c9d513ae0dbbaf9a1f246cbb01d424110f1e077c908fa3114db41fc79a7fd278a0d8f9bebf5ee367a7747ec9533e97357

  • SSDEEP

    192:uW7qlb5nB/rsnQjxn5Q/tnQiegNncnQOkEntvLnQTbnhnQolXCFAXWDszKP6Xz6b:8Q/BMGnj6yRyrsXa+nOl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bead0a447953c5ed7b1e458350f52559.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bfaf9945b4d759b2dc501326588825dc

    SHA1

    ce51afe2cecba006cff648c17803242266f2c8ab

    SHA256

    343c915852e9abd47ecf681abd39c6129e92fb495d69ec6913d026fae847c9dd

    SHA512

    62674c1f2621cccaa23aacf45bdbed6576ea34df50a247d81d2df6e445b938368ef20a852a208061fdda214c6851219d72b41522e03b7ae162582ea5a5bdf745

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0050ec8cea064b497e2f6d4f46871897

    SHA1

    485f3a12784280cbec5581a90e08aa804fca6ac1

    SHA256

    1d2dfbf661460c54005f6dad3a825875dcedf815575ebc32f2f4a0415b86419f

    SHA512

    297f7245872d94244c2dfaa1c42aa210790b5d159851a883c6b734ae45a6026a6616d825e2fc69ab116293d426da8d596e9a2cc64bb223e8ec9dc9db0f94c635

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3246ec1761dd287219a93faddf335af3

    SHA1

    9168ff439116496141344f674d1377a1cf71eb37

    SHA256

    3f97fc91e72d2cb406c3d6091126188cbc4898cc9b0b333b9191aade941fd581

    SHA512

    76b6f41419aabd0b84c3b13b6ad5cd655efb1cf2cae395168c8555387bbc8ac4cc648e6d86b1ae13dfa86c89187494ee9c4d27ea46bf22b120cda2a2d9ed1649

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52b3417f6036334884fdd9a005ffda26

    SHA1

    ccbb6d215167e81ca6c5727704a152de644c5d69

    SHA256

    dd0b1e35c99087c1c89be6fa212aa72163b73f787fce7175084565deba30c0b2

    SHA512

    5f98061e00188bbd8215ebca95702602368654c84cfac1e69e6b90c2670a43aa8a827686e15297c1e0f9af869a49baa20b757a4942401c29ce7593bfb5f5c459

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    98a6d147b6d78ac9015092f507765f3a

    SHA1

    8bf88ae0906d9ebf06ce8a238f4452741527f1e3

    SHA256

    4114ade7a31bfedcd1afbdbcd4f327eb04c025c0d5492ba09f4757a23045c33b

    SHA512

    fdea99dee28544be7e2ebba6bb2d86c2d037c1e5fb8457a4d1a9052d5a7442c7e66edffc862841767ade00fcf1ca8472208f9a9a4eaaf45fe43652483035e450

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7ca6da8b557b88adb48f3e9786acb73b

    SHA1

    8667fb3f3e0dd1e1bca2e3d1f72da0e503c103c4

    SHA256

    2d800be3d2895a3afbaa62b109041c91ed58630dc83ac01b0073047b86ed87a1

    SHA512

    8da722d14aef4b3a92927810e54037f2f48d59b9f226d123599feef3efa75de91adda767e7475d931f18bfc3cd0117e80080c2db66a7637518d8fd0ef83f2f4a

  • C:\Users\Admin\AppData\Local\Temp\Cab4E9E.tmp

    Filesize

    41KB

    MD5

    23bb808fa5f51dccad249fb0d1278f54

    SHA1

    91138289e4cfa8e1ace23158e40f8f7473d83f06

    SHA256

    977c1f4b938cc7060e2f82815aeb24f25f796ae9a030bfa94af7920defda1e8c

    SHA512

    d803befcc411f719ea43191939ce8ac8eaa818eb5ea351ab5a2c7bf004e9bfe46e8f9eab6c2f71d563725e4e2cd0a47cec748f3b0e1d019f35da06f672f9556a

  • C:\Users\Admin\AppData\Local\Temp\Cab5823.tmp

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\Local\Temp\Tar5848.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63