Analysis

  • max time kernel
    82s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    30-08-2021 05:46

General

  • Target

    irs/test.html

  • Size

    23KB

  • MD5

    f8968b5cec271891dfec168f814a0ed7

  • SHA1

    b31cd27358e4fe531ee61836b41a943e9c9e2ccf

  • SHA256

    2833d9fb8fa07e55dd18b5b22af852f793dcfafc9c645d40b0ca0f42cef5f556

  • SHA512

    52e72de8202587fea152098d68cbbb10faeefc05bbd943ab898d5dac361d6560e0f95642af19a024e6e589a7c77f2e3cf594b9e37a2c4148ada62b90e583202f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\irs\test.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1828 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:744

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    MD5

    243478016188b4bfbc62010a460e51af

    SHA1

    49764515a492bf9640ed9e01ad21841b26735f69

    SHA256

    353340f2bca6f458bcc833acf9e819e4706b293b43a34f711581062ff027b044

    SHA512

    2a531eff86cbe34df5d7a38c4772f4d2f86bed587cc5a4f79110ad9d7f3ee5dc11c9576a0d841db03a924afbfa18e340bdbafce3fffda6a59b097d727a23a90b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\S3YFO31K.txt

    MD5

    3cfaf3aee8dc6f09655424d71b02d99a

    SHA1

    b6f2a0992b53a672f6a90d72f1ed0b2be80400f0

    SHA256

    8c34eaa231f8261d02ae3149e40f2fa2199f4cd0b10c47b28d1ea7f8efd9c285

    SHA512

    9122b93a7c0299b3e2c7c0a29d023719e0e45cd86cddf8f78a56814ce63ff2042c814636ad7c98bec4ce9867ade7ebe7f4d608c40b0fd5fbdf53476c33fef9cf

  • memory/744-62-0x0000000000000000-mapping.dmp

  • memory/744-63-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

    Filesize

    8KB

  • memory/1828-60-0x000007FEFBBB1000-0x000007FEFBBB3000-memory.dmp

    Filesize

    8KB

  • memory/1828-61-0x00000000020E0000-0x00000000020F0000-memory.dmp

    Filesize

    64KB