Analysis

  • max time kernel
    159s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    30-08-2021 05:30

General

  • Target

    en/CardServices.html

  • Size

    51KB

  • MD5

    552ea57a60c2e2fdc18df1530b1f2889

  • SHA1

    00315ada858fb2344bd03485fdf833c95f66acb1

  • SHA256

    782e867be9a29c21caa5f510c337594aa04b276511f03082dccbaed2cee3f990

  • SHA512

    25eee6a1cdb083f9d6bca2956a790cd24c047b7670bfda78eb6529a69f0e45606ee152419519588e972ed66df64869cc2eebaffa4a5868d51d99c9a8789a2780

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\en\CardServices.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1892 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1940

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AP8EV5F2.txt
    MD5

    8bc87fb1b9112389583c915bc2352b2b

    SHA1

    6c1a4ec1db3ead925dc8e9f346ada8f11d38ac13

    SHA256

    5655bc35515494ff5037394419caa9f147ec0a32b9cd4886898bba2676a9e1ff

    SHA512

    a236f933d7a236fba123b03ff19fb55b92a1ba525eb1deffb9e3390d711fb839eeaf7a8b9a493a8f0a875a788a68aa526217c9280ba2c60596ad7948263bac18

  • memory/1892-60-0x000007FEFBC31000-0x000007FEFBC33000-memory.dmp
    Filesize

    8KB

  • memory/1940-61-0x0000000000000000-mapping.dmp
  • memory/1940-62-0x0000000075D51000-0x0000000075D53000-memory.dmp
    Filesize

    8KB