Analysis

  • max time kernel
    120s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2024, 20:43

General

  • Target

    sample.html

  • Size

    3KB

  • MD5

    cab6057f3fb0bd14fdb154c9636f2acd

  • SHA1

    dee42b01b6c0c8c4244309249bed3dac8a875caf

  • SHA256

    48cc5fbca021072cf7be4f476ddf522623aa9abf483623e1722a92f074644324

  • SHA512

    7363c7604577ab5fffe08d60bcd92852fb9724b8b95a08d8cd910859ec17ee7c57adfb7aa39b54344ca89c830e0edd94776da47d924aa389c48fef5c6c7d814e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    880eade1aa59dae760a328504b6bb6c9

    SHA1

    6b83f388073dfc0b4eecb79bc0e0456c69ab8af3

    SHA256

    b1abbbe218ea024a2c0fa5e7ebcd7a6c2d61b96c2c5f4dbc714a223a8768c6e8

    SHA512

    694a8317913d07e2966b7a45484f21303fcc830c0a146d2c483cbceb7a4874ea1d8122f92b854243b3bd1f41dc85089446d7d536fceaf56b5e7c920077846f33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    05c8feb8321c63e6dce660b1b4da4dd2

    SHA1

    758cdb287c937c3ffbf71f8ea7e28c90ef893278

    SHA256

    4ba80cc13f74e36eca6344f2114e59740d54e5e823a8aa585d510ec50126c60f

    SHA512

    5550e27e8bcc1c535711218e9efe874b1a995594c2ffc219ac2ae0d95198708754576b23dc7aaedef2f4eea6afcbfe9fec004bae78e163e686d2b1f4d89849b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    af17db6a773a2fdc70bd74915cb267dc

    SHA1

    b07d5ce4ffd1d4ae3d1d73bb60dd9d8c7a436314

    SHA256

    f191cccc09822bd53908ec0b62dba00a77edf4ee15a6abc6301e5d932e57a72c

    SHA512

    f4bad8b43bbadcf2da6ed3e919cb427d49b40296d0e6dd48cbfc9128a566544ec05a66967c911ec6ff5d079e86aba63549a7c0dd2f688298b34fbb12ee251c4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f87a2920e681000991f6a0ba400c93f

    SHA1

    d6ab806ca060f737f04bdb7380bb524f1e412587

    SHA256

    d097e3a9d51f924cc8d1aafa381470f8d48b2c07ff852b1584679049a4d0fb9e

    SHA512

    234d248786d25bd95161a7c6cf891aff50350f3dba3e2bb8c52fb935eae8f696b1f3744cf1a9e52fc1c27d67293780be4aecaa93e6e712b6fec661c25ceb037d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dfff626a1e8fc84d02a199f390c5d472

    SHA1

    2f81dee8e6f046d187ea97b66e9ec5bef3ed01d1

    SHA256

    0dc3ad82bf0f939420941a84c28260d7f5fe04d61923d6c2a189cb4e82ebf5b9

    SHA512

    f18dd669104b877205b9ad7d52860ffb23f4251778c3f29124c9243b29b13a10e4f03b89cdabc9f138674af4e5c24a14bb49b21ff0163dc3b24b975b73f84077

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b7060698e02835baeef1a1e51eee5a7

    SHA1

    2b56bbf2e35ef1aadbbb05aded32da10037f54f5

    SHA256

    010afd7a3697ea7143471c4d7b74981785bc1ed04b910f8284bb0070815ee0ce

    SHA512

    a78593672c88e389b2f6ea6785e47b2a121b18eccea98f03fb2d3eb608317bee6bfe26a59265813e8bb97e0111eae29826eef087fd81dde6b1723486122cb847

  • C:\Users\Admin\AppData\Local\Temp\TarFA5E.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a