Analysis

  • max time kernel
    120s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    09-11-2021 09:58

General

  • Target

    INV-37153-DUE.html

  • Size

    1.2MB

  • MD5

    512fb8f68762a521eaf27b7238f94139

  • SHA1

    65ebecb99fbbedb08dcc5ad68f1c864fe424e35c

  • SHA256

    d3844832d8214cef2c64d8bbb4116ae16fd17dc7ba74be95b4dc386f3f3de10c

  • SHA512

    f7c1123a0882abce954c195a0f3b07f0dde823be011f2b8a3d96c7924fe909c5728697e5f29fb29cc00ea890fe46264ea70befabee65bbda90642801afa7f6c8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\INV-37153-DUE.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:652 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\T5L3K1H2.txt
    MD5

    c8ccaff6365c985cef804497a1288732

    SHA1

    d62802496a6c1682662dcc036346f962639ca1a5

    SHA256

    5d839e19bc3f8fef34e34c5470f910a39e1f51700b9b5b3a3ff08e915bc6482f

    SHA512

    e5330c8e1d4760fa9b4b7193f853121cd109d83f89831f63b11bafa37704e27ce54ff46babac070451fa346cdbf298204428927ef599a14d68bbc2ad1e901aa5

  • memory/652-55-0x000007FEFC1D1000-0x000007FEFC1D3000-memory.dmp
    Filesize

    8KB

  • memory/652-56-0x0000000002160000-0x0000000002170000-memory.dmp
    Filesize

    64KB

  • memory/652-58-0x00000000036D0000-0x00000000036D1000-memory.dmp
    Filesize

    4KB

  • memory/1608-57-0x0000000000000000-mapping.dmp