Analysis

  • max time kernel
    31s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2024 21:12

General

  • Target

    file.html

  • Size

    15KB

  • MD5

    846eb862da864b126a537ea9bdda7fda

  • SHA1

    52c7be2eb432e9415fae5c1411a2c06216d247db

  • SHA256

    7870bc2a46a8b664093b7fafdbaa8ddf4fd4e4ffafd1084c58cac4b46906fe93

  • SHA512

    c6e2acc12673fb1421f0f01c2c662b5c63a5234b9c863c1064ea5be928853026f0c5e2065c818e31df17a0eddecaccdf4a015bfea95719c76ac68a8e0a5630ea

  • SSDEEP

    192:PNxyShvK9moqTJkNrv2398KPuASp188tWxDsL0nKD4PyCa3IyK3N:yShi9boJkNzfuuASp1ysh4PyvIN

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\file.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7a50300a11a79b434b83fb27bc2da5b

    SHA1

    cec288d0bd4c97c8d4ed965513a41becaed4e06f

    SHA256

    f59c751f65083701fcdeee0c7c7f5a268294529de28340a3057115780a3bfd42

    SHA512

    852daf97a109d025f56d4fb15920fe794ec1ebd67bc7366e1ad0ffebe57ff01ea7383b3b48afca28c4e73930b1133712de7060ce5c5bcc3964e47f6eebfcbb49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7adb3bfd65c9528f13dc6cc644c607ee

    SHA1

    ac37b4f20ccd8f472511b7d22ae930c68d3a2901

    SHA256

    626dc4530e69e5c5e63639cc0ac54707135153a16943e92244fd347729e431f8

    SHA512

    7fe2219df007bbfac04c639f500322961361ce78b816d203daf673105fbafc5cdbc8292003942cb2be14cc599d5fcfdf339359de6e24052f80be8f472d32e02c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfd46c1c4c80cebe1914e203b8c3261b

    SHA1

    3f3c6f39ce1690c17edfdc9d1ae82c2c2702f358

    SHA256

    33603c77c03fcda2a0b0a29d09e3d66c52d67a60286bef719d5e33cfe4cefcec

    SHA512

    0adae3cc8c05a62b7fc3bfe2ec50e439caa9a2e5a4939faed05a7493cf17e050b2f8b48e0def27f20aa5b344587a99233878be12fe7c6ff5fca42d2dc18afcb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49fb2aa7c105c402f327442dd574eddb

    SHA1

    db5e25e5149ebea5c801670e5857c11c2f17bc7a

    SHA256

    e076c6c25a1f7c44dbd1dbbc375e2d7e03b4bec6e3bef607c824df73b101494c

    SHA512

    34124f343904ad8cf3def9a2654c487106f5a520a28d775d9ebb65611e4c36d42fef91572ccc1d15337a5601f188b16154711239b8f295c73e0eb97da3ae7980

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d10b761d8b4ed4ef67641d24c5d0239

    SHA1

    855b8e6a05a9402f92f917318e3a591d00170137

    SHA256

    57dcb6e7a32ed3a2a95e625aad2667c628ea4b820e3110b3498d4c5bfd1630e2

    SHA512

    1aa2b153d4a05bc1cf81e8cf67e51b2005f5c81c7a99ae52bfef919c5435f6a066a02066041d141a87c8e83883f83fd0d58013f61bd9bc29f6a0bacc1233f79e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d7b9dd28c18b820ed0bf1b00457056e

    SHA1

    1319b5971b43b24c21806063b8b2a53293a0420b

    SHA256

    21c8a6a9c081df819d2160b0f7ed8ffd37fc18cd215823f5c5f1e4d90ead449d

    SHA512

    075847982eecc6826a41113fe192fabe60a7203b4cd49653d9056311cb9c4e1f32ada9448666a10d83ff2a4ac88c42c0c8f8cbc16b63d5506e64f260c811c127

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83f43539beed19d27b4b9c7f4aa24cf6

    SHA1

    f3a99ae5c4f7976b71b72b49ac7c79e94a95ee39

    SHA256

    74b35dc4cda8eed2b8e90e6b43f578945684d51840ea803a762762f3e3d0c20e

    SHA512

    6d5990852a9965045e69c2c666cc9fd67eaec67e9e1215d5850a4bda4ddcd647efdb25bc4930ff9467601fbb65efcdee98b167f74b14303044a5cd20ea39590b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13c94342caeafe3d402e851d32337895

    SHA1

    b2801bbdcdec70e9d4a53a4d18fc0be99e197b8c

    SHA256

    6741dbd74a9775e581a31fa7fb831c0fa6a5a3ba41e90fd13d76a18fda8ef283

    SHA512

    80d96fef81db8b84870abc3df8c833dd20f126144db0f10eb1a4bca5862e84c63da5ad484606fb39a650cb79416da3c55de3736cf67aebec181dac4422c3d264

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c26553512f1239a76ae48de448822d96

    SHA1

    3a9f2671169a37bf35f70ad0e962d113369173a3

    SHA256

    33fd1afbdb1945d42fab1b284e1fff253263bdc488da5d81c12c37ca9c8d1d89

    SHA512

    bcbd2257c469501c55baf44dacb92b687a37e31671d527d5281317ec72dc2c0f08f86e22d5d9b45e1d3ca8fdd38662ad826303487e14c51675dea84a5daa0c9f

  • C:\Users\Admin\AppData\Local\Temp\Cab4D97.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4E36.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\~DF235C32E75B442850.TMP

    Filesize

    16KB

    MD5

    bfac89535893ede11b27a46b15ff0e1a

    SHA1

    1f6a26767338bc3cc3e5368108520b31072a5934

    SHA256

    d1bf90b153f3fb252dfc1268b06a54424be8dd5ac5eaa951490f0a17ecc0d563

    SHA512

    727e94f56b6a49ab6ba2cee9f4a644af503214c356dd580fc1e4a9c580dab46f349d71aa58212009daa28308216d5dc0adcb912d835de072636e56e13c8cee69