Analysis

  • max time kernel
    141s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    27-07-2021 19:03

General

  • Target

    Payment Receipt 143047.html

  • Size

    395KB

  • MD5

    349b929eb818020e25e9e9caba48d037

  • SHA1

    4ca79257f94c77051e4423227c9ae7a89c39384a

  • SHA256

    d2f547411e755379465b33ed201bfbe94a2b50f470d15fb8eb1282069fbba48f

  • SHA512

    bd7cf623914642925e0b75d39ad9fa015782efb6c3229dcecbafcfd72a8f5edc94f2ef937c45889f5c504ae4809e4ce8ea760007491d9f47db71803b4e781368

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Payment Receipt 143047.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1092 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1840

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YSVKTN1U.txt
    MD5

    3423d2800da8d2ff45f039ca19045144

    SHA1

    8f8bf61d7522aec7ec5b66de41ab93377c8a4d9d

    SHA256

    2d3ce5e85ddd3d8590c9007cbf31cdb8d9e2ad8fcb3b7a4d57f83f50229b14a7

    SHA512

    5854e0993555993e7b00784a45c1b0beab7d549701f515702dc4453712ac466108affa82b584290187d56e0d3304a00192c37a44ff28672714c8eada5b1bcdda

  • memory/1092-59-0x000007FEFC301000-0x000007FEFC303000-memory.dmp
    Filesize

    8KB

  • memory/1092-60-0x00000000020D0000-0x00000000020E0000-memory.dmp
    Filesize

    64KB

  • memory/1840-61-0x0000000000000000-mapping.dmp