Analysis

  • max time kernel
    120s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 19:44

General

  • Target

    404.html

  • Size

    1008B

  • MD5

    7836b08e972fa2744773beedfd779fda

  • SHA1

    c095acda0c23d947459ff1e7b454a00cc8546498

  • SHA256

    10d6e8b5ea724fd5d06ecf37007fe54c03bee8ffd4a6e54c68d10f9483d8b1ca

  • SHA512

    aae95554336e9628dea7fc360e69166cc9f7b7f80be20589041af9d8910f022b0c19175a425d65c03e40d48ca897974487cae27916de670131a3fe2c87ec76e6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\404.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b4767979f9e98c665774a03a0666cafa

    SHA1

    78622f41b9933abfa1581a1d1a33e5179d588bfe

    SHA256

    e2f8163c3407158bc80be8da7d1d0ae84479861bb847b58cc558fea4943849ae

    SHA512

    94a474799b30f022133a28f21663126305cd3d037bf0ecd1b63e67c0dd9952ee9294d2e6dc652186696cae0964fa7e6cd7df0914aedd5f6ff26a86c91380affd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b09f9ebd77f3f25ae7eb26e3e61b814a

    SHA1

    305f7c45590bfb7b2bbd715822c8496c37fdbaec

    SHA256

    67c01a226925e9ab90603253ee202d37ee1eb57be2fa2e07de5a8b0932cbfa08

    SHA512

    c9280fc22753ce0f0829322fbaa54887cbe0f3fe54bd56a243e9257b7b13041c44898a735813e68871a84ae9e70c93e0cebf8833f7af703d103576e3d77b4928

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b8711d5a6f573a0fac7562cf9522b34

    SHA1

    d6f0234175fb6dd385fc0ce0c1cf0a9b23e72645

    SHA256

    eb4a123047149de71e47b4d6cc1299349c142cc75746b40cc69fe71f62043c97

    SHA512

    1a5abb55186fa659481b3363ef2f98489f9b48c1e5580d66db5102379bfdfd2984d3ca37c5af8d763837c48d7b56ef921ae3eaec5e34b984fa823bf9efbd975b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    37ee36c6f2dd494e390d91e8ad9f58f2

    SHA1

    1a699ec61c3cd2507c81f98de7e1b47850592086

    SHA256

    8b008aac6fb7be8afa41bd6855d47240550eee159f4604b0e4f1cac1bed0646a

    SHA512

    8640b5f7446dc16bd292db4129a1b04bac59a876430e1af1e67f5b5f787cfe84db9c58b4e71881be52e8f60da2f85ced3a9128ce1b05b37215c4fa700c275772

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5ec17e182fef763a7c6d212d3649ecd6

    SHA1

    53bd09624b5dded603e2a117195d238859003bfa

    SHA256

    422e88688300b0eb8d50352b7c1071162e9d89be369def15d6184ceaecb69059

    SHA512

    403bcef60648905e627a45be1b4212ab6c1c477951d21ab3f52606fbae7a6f091a4c85ae34bb3415ac4192252c038224b015087238762e96e2fd6b09c7bf9f42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e34c3e2f036d4fbb131f1de1db113a0

    SHA1

    bd890ba6835e93dd9e83c5d26c10d12fd82b7d0c

    SHA256

    40a9351647581b3993eb3446def16af6244700a81f357752823a7727fb29c3c6

    SHA512

    e23be4d1b0d00840c6c2dfc44b7210c8875d24d5f6463d7a6082959e5d36d018258dcafc1f6c521010ee3358fb90774ed6a296d3f08daf830f3970878bd72d8c

  • C:\Users\Admin\AppData\Local\Temp\Cab2ACB.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2C39.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63