Analysis

  • max time kernel
    135s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 01:16

General

  • Target

    c498c997ed8d5da03ca5d0a88ff7e535.html

  • Size

    68KB

  • MD5

    c498c997ed8d5da03ca5d0a88ff7e535

  • SHA1

    84186e76882c8311261014f4b39202ad17354951

  • SHA256

    9fde43f2da468071c42389fdc55def58c274d72ee8af6c314a1f543d13446a87

  • SHA512

    40ce2fa91fe16a51618863aac21453a7009e3d5fd09700e352319f1226a3c843989f53493460ec9084274cd134631f3df126657a7817074fd2311783852daadf

  • SSDEEP

    1536:mRsOxm5N15kmbVLtSmoAKhlmeKgCmElgSNmoshxvZmkUr/0m9TWXng/pmX1/n73G:PNDRBsKBTU11wKNTYr

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c498c997ed8d5da03ca5d0a88ff7e535.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1332

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          67KB

          MD5

          753df6889fd7410a2e9fe333da83a429

          SHA1

          3c425f16e8267186061dd48ac1c77c122962456e

          SHA256

          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

          SHA512

          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          99b3e81c9d7eb0b295e6eb859cd8f5f7

          SHA1

          36f51e215df184c6fab67e945df8076b52e9e1e4

          SHA256

          730e0a3c6a67c8e45edb24e0b073446f0867bdf90020d46798c7e49859ec0b1c

          SHA512

          9a740a02fea0b8d58fb409fdca14d8318a0c691a036ecab333bb0b2bc9491fb22b9d586ccc5de9e0043b2c06f932cdace2947c9e8f15b3a1f91ac5dcd6fc8ad4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b4f4ac0c66f400e495598bff44e663f9

          SHA1

          6183dc466f1cd4604ae768c24495260043f85f69

          SHA256

          2906c2ee548c7b949819af8ac06f314963d77eac5f8260fb34245232d516fc2d

          SHA512

          003986961fe1d97eaab0282d337400b11f6fedc4d31882b1e206c637303a07c065ccbfd062f1c23d852c9457b86a0fb37dbdb0e344e5c1094034c166b7c6c9e6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          29f2bc6d1d97d2324013abbf8400530c

          SHA1

          d7761c9c1c691c05befb47542dda02fad0dac8eb

          SHA256

          0888a027fba04c037889adc1fc03d7bdc042429ac9462b724941c64e7e3c6298

          SHA512

          e4ae402f6e4fbf25f0c0ffb6e4c1e58e7d79957e66ce70a60969ee4892466061986ccbf3c852ce42c89b185ae96f54adbc77dbed47076aa38d100350cbfc28de

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0218e19ff7c26f92acef13998f10fd31

          SHA1

          2ca2276c61d15f34f3aec5dfde73cb7ab524e94d

          SHA256

          4d0cdea46ee75be68e7db7061466e1767121e0127c826625f47ae0b501c75383

          SHA512

          e56828c8bf404613408023fdb3eb6d00f47b212b677a148a717f929b5c854740072545e3b136dc9a531f4f081f9b1c9184468ded3f6e7b6b0f13cc76ac88e42d

        • C:\Users\Admin\AppData\Local\Temp\Cab5A33.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar5C7C.tmp

          Filesize

          175KB

          MD5

          dd73cead4b93366cf3465c8cd32e2796

          SHA1

          74546226dfe9ceb8184651e920d1dbfb432b314e

          SHA256

          a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

          SHA512

          ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63