Analysis

  • max time kernel
    126s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 16:28

General

  • Target

    cbe1f51aef850b344bd1f0680c4dab63.html

  • Size

    42KB

  • MD5

    cbe1f51aef850b344bd1f0680c4dab63

  • SHA1

    cb19ec760989376b0b2096fda0c090e4a27cdddc

  • SHA256

    e6812e4ad837e5047df0b9af02efab5fbb5f697554d89ab5076da95067f73fd5

  • SHA512

    7ab231cfad82ec37ce6c7865aabbd44131930a4bf7127ca43348fa1ffb6c08a10ef46c998a008b6aa3eb3a18fd089a3ec34d1c380a91eef99c173225b99556ea

  • SSDEEP

    768:pOTKNPw8rqoHqKbqNYNXNtNON0NBNEN2NLNsNUNhQgh6xLZ:pOTKNPw8rqoHqKbqNYNXNtNON0NBNEN1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cbe1f51aef850b344bd1f0680c4dab63.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e84e7748c554b6a73eb6d890bb8cb5d6

    SHA1

    362e97afabb650febe1ed955f4ea9c8ce9fcecef

    SHA256

    040d2ea88c04531f33a49f9368752c23c2a12e97597268895c18bb5093b5057e

    SHA512

    30f1409f82819e77b18c8d70c952312b1bf7a890da3f0a7565a163fc5069428f0df839092c9e492f87349017b90db3a0b50e1526d334c03623740b001e05c7a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2210147c96c10415e8c9972394e6555

    SHA1

    ebe05c00e74eadf2ed41d5a63820eaf4b3223026

    SHA256

    578738286187472312d8932e1500946407d128682bc110c3221e36be271e7ec8

    SHA512

    cd1ba48d246b4be4bdd8f5da8d184862c3ef190b04acbbb563bf2f79745173a0cd70c887cebd1af11d9b481abe2ee9dbb2a7d2cb3b8cf92dd585979fca39e9d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f05833f9cbd95bddd597d5fc5283b10

    SHA1

    b071b92285aff00124add2b6232ae3d8411d7346

    SHA256

    19909b5e162ce74c32b01e8b0ffe004b83a83077197958f2b815a3a383f6dd1b

    SHA512

    9a6e65a36ea2b35fffbc2b68579631473fba03c55c831122652dde205775bb80abdf820d6064eac29b26cf10882d17e75a8852b73bfe77842c0695eb47cc989f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71d42938ab902b152bfa1f88c3b86f67

    SHA1

    42c2bbe19034b5b24774de40b98beace9b7c8750

    SHA256

    1a8099a67a02ae1754f96475a26a439ac6b61f3d546283065d38c292c2885f58

    SHA512

    df7e18259e34da041d0b48b314e5d8c39e062383a13dfe3ba5b5f0fc2a208aaecb27fa0a048d5d68d9ea62bede6c1a3e69861cac0094c42492e50b5d24f5a3f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f1cdc31af1f6d539a33f2a9ae894f9f

    SHA1

    5cbc36d0978ae55158adac3347e215ff6ac616f1

    SHA256

    53b00d429f19cdf8c12def1eb1a2e6ca50c6f4ea115f7c8af465f3875dac07c4

    SHA512

    23fadb06b2a663d3bc0769aeeb5cd6369002ae89e9a49e51d9c72631f5269d9403fc54a75970df4ad7396a40fefa72c617e5c9e33f2e6bedc6b0c71076657a07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1eea95f7520796275fe5d7c7a86476cc

    SHA1

    0c56e837902cedc59c1c6b45765a289c886a5cb0

    SHA256

    81aa41b34b390c35cfae996bd1d9ec994acd100077a75b96821378dc415494af

    SHA512

    596dad5d395b0f61e53c53343839ff3c20326740081e135035456a2f670a270c262d57d42af6421fd6711360f6ea7c8952d84184cb1a00640b56a56a76f64202

  • C:\Users\Admin\AppData\Local\Temp\Cab588E.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5A0B.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63