Analysis

  • max time kernel
    118s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2024, 12:56

General

  • Target

    ce1d91a8b9592dd5b8d71eaf2dc6d0ff.html

  • Size

    1KB

  • MD5

    ce1d91a8b9592dd5b8d71eaf2dc6d0ff

  • SHA1

    f7ce17f02c174e67219b40576a10ddc9dc6bb48e

  • SHA256

    26ce493921c14bc3c6c845a73332c55bb5f50e8a0e259e1e37deffecde451ce9

  • SHA512

    8253922a2989fb893cc8f53eb9890e5e5dd1d2f4ee8428f2733960600bfb01119a8c628090720760e656880036f16328b3e32d26255c1032f2004eea73b52bd0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce1d91a8b9592dd5b8d71eaf2dc6d0ff.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1028

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          67KB

          MD5

          753df6889fd7410a2e9fe333da83a429

          SHA1

          3c425f16e8267186061dd48ac1c77c122962456e

          SHA256

          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

          SHA512

          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          bf0ea85673406e3985f643f37ca2e8d2

          SHA1

          bc537e7e6f98b275b9e84ca4088628da960b8fdd

          SHA256

          5e438ed13aa92919eb1ce0db98899b6f4763f84ebcac73c481b568c13b88c462

          SHA512

          5eededf03b99efbbfe85a2a08a7fa256c86377e97c284f21eaea552c6c3cbd1af1925a29ecc05fc775fa5235b86633bd544c8306ca2ab6c257d8837af47d9343

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c0f93e662d771d1fabedeb47f7450d3e

          SHA1

          9f9b47fc78441129402ac2056e4ae44635f3df0d

          SHA256

          cb47da3f134b28ef669bb0573d8fcd5a06351540335486c6943e08c5ff78679c

          SHA512

          c112d7c2fecde7144e0db59cda4473bc36cb006ba4c175dfab6d142e27d239e6d39b8f8e75e39ca247deff00291282e078405f72bc2a9200762c1122c3318343

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d19263431eacad39c042cf51f1b0fcef

          SHA1

          121731aa512a53ca2a96f44f5d9bb8e1afe264a6

          SHA256

          49a12c4897f0fc09abdc46dd65efc3d4037527d81771c73841c3914aa45f669e

          SHA512

          77c863af39884784a857df024ace9f0ffec531cc2c82b865297e9a6c69b28503b2849d0740e8ad072271cb981774cfe10a67313f32b268a6123f35bf55a14652

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fe8654ea45b5bc2dd1a4815e91d011b6

          SHA1

          49b0986798507d83dd51569aebfd6511ebf5e272

          SHA256

          417cfbeb4408eeec53743910e4a433089666fb2616b01dd654c059fa9c614b37

          SHA512

          9476af1de4f4c520f2e048d8d69498da46d8bd0e928a33bec7de8ff56efb033ae68b6cfac984daf20cc8f92d2e84bf15028c4da63e2c7e8ca713a357df7839e8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          9b99710d04c0d07bbb31ff7df74cc250

          SHA1

          f17ba6ee5cf735f827a5d9c9bbb3cb6a9726a50b

          SHA256

          e1e604a330ee054579d17e5eb36a7adf697c118c3bf842ec55efa64a2a793857

          SHA512

          9fe2de1e38a6a79a9bd53874c31c7edbf2af9d5ac3c0e05fcfaf5cbca3e9ee631dd66fefce42bd399d2e7c8616c812d7c0d0f944e6cc5f176c1b897a31a4e891

        • C:\Users\Admin\AppData\Local\Temp\Cab1F53.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar21BD.tmp

          Filesize

          175KB

          MD5

          dd73cead4b93366cf3465c8cd32e2796

          SHA1

          74546226dfe9ceb8184651e920d1dbfb432b314e

          SHA256

          a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

          SHA512

          ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63