Analysis

  • max time kernel
    68s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 22:23

General

  • Target

    Paymentadvice.html

  • Size

    74KB

  • MD5

    a3499a6bc97a24bd03b42849e106343e

  • SHA1

    4c4d9f77cf64aa7d102fd4e749fd01b128c548ea

  • SHA256

    cafbc585e0e6bb529bed5212a3d0a2503f2f1a6e9fce3913d7694c501aeb0ffe

  • SHA512

    66e2bfcc0e23ef530c9231489a36ac8f7d65da08046d02c5d7bc77083bfd6f5f084370a8b8a2c4c6263ff6a8b25a18bc833af1e1fb6adb4b4811b79be74113d9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Paymentadvice.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1048 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1988

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    3286778bb5719872f02def7e37b9d788

    SHA1

    571115bd18e55ccd05134e200d5039e862df1c91

    SHA256

    abe27f55878c5fbfc133d1ff64ab8943d295cfc6ead54e031fd9a442e660e068

    SHA512

    5bbf8fcb26ae3ea8553562ea9bc94c7fd753dad585a810969916d8ecc304d4290e21cf7ab56a987706d686a1e42b9a1215a62af27e5eea710f86038db49a43da

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FE9PBLJX.txt
    MD5

    7c992dae009544cab8a2f7764d0181a3

    SHA1

    717de7d6026c267c69ef660e79c2ab1175ab73ac

    SHA256

    fb1b2c2efb19050a87b17fcc93d6e130c8f2b43d07199248212b7d3a07624c9e

    SHA512

    eed22c45399887ce114553c8742d7603c1c918f5edbd8f9ec5022ab487d9a2f63f08983c3f6eadf0020e3dac12e1a4e774b8c199811bb45e485692138c7be414

  • memory/1504-2-0x000007FEF71F0000-0x000007FEF746A000-memory.dmp
    Filesize

    2.5MB

  • memory/1988-3-0x0000000000000000-mapping.dmp