Analysis

  • max time kernel
    119s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    11-11-2021 14:21

General

  • Target

    Payment Advice.html

  • Size

    173KB

  • MD5

    f960ac2710faa1aa99b3fb5c69ee5720

  • SHA1

    305de909371eff47b4e758f6d3d7afa60e478176

  • SHA256

    90c464099ad4f02a8c5925a0f631d4d9b6e75a425176375bf0e170ecad50d561

  • SHA512

    10df22208b6148f3c639067210a7dcb9a4dee3d538fe8e05b1f8eac415b6841a33e6bd761f2d1862e577a0637c483805c9cdd12c4be5987b087099b80df5c06d

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Payment Advice.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:944 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1464

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    acaeda60c79c6bcac925eeb3653f45e0

    SHA1

    2aaae490bcdaccc6172240ff1697753b37ac5578

    SHA256

    6b0ceccf0103afd89844761417c1d23acc41f8aebf3b7230765209b61eee5658

    SHA512

    feaa6e7ed7dda1583739b3e531ab5c562a222ee6ecd042690ae7dcff966717c6e968469a7797265a11f6e899479ae0f3031e8cf5bebe1492d5205e9c59690900

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    efebd7b18f607ba44f1324edd02ac837

    SHA1

    e36032e73c0a9b2d04913ddfa43d2554a3af70fd

    SHA256

    184995977e6826caaa09d1beef617a505ea33ea133c40935d24814e16495f1ad

    SHA512

    34549a9dda2ac9f293f8e04f47a847aad79bfe3bce92e975b3cf24b123c7ff565a3f544eab11489a480a744193755099afc4294126e1b4823c7dfd0a51cb13b0

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\r32q9i9\imagestore.dat
    MD5

    f24f4c98689d21e59e42104fcb275283

    SHA1

    78404f7dd04f82c0ab8338fbad434b997576f863

    SHA256

    7764181fbf17afdee7077474d95a7edfbdb6501f20ad7d2e32aaf4ea98214f2c

    SHA512

    1707510d612d3e8f7ad1e71790c861e5b208d2f5c40969d0823902eba9c6a2ad5daa42f431b7b263c09f88edb3f96e23294f62802af9fe734bec4665f455475b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZTOX9SBQ.txt
    MD5

    b7d73530b64f22efad9df008903bc5a0

    SHA1

    732bb56d9bfc615a6d3743be720f7abb1958cb33

    SHA256

    b5de0692f06a806c6c010dcc68a2728bea42f9823298ef9ebda268eb363e8a27

    SHA512

    cc598c6bf3e3ffe2d6431f7a4936fbabec1bf14edd44b403b9f6dfd8b914f3f8e84455ac52736d6001a2cb51cc6c9320a46e867ca62aa5f27f741bf00b4cd31b

  • memory/1464-55-0x0000000000000000-mapping.dmp