Analysis

  • max time kernel
    120s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    12-11-2021 14:46

General

  • Target

    Purchase Ledger RemittanceSUP9935681.htm

  • Size

    1KB

  • MD5

    673ad47c37cb4a2f9a677a385a4836f3

  • SHA1

    94a50cdf187a7668948076beb5ac2504b12d2170

  • SHA256

    84e48bfe7e3f9e5dbf149a0fb007c83e405b3679b063a4a6f2b1577f1bef5fcd

  • SHA512

    22ce75643577aeeb492fccb9993fb7536e85a976d4ccf4bf13d0606cc14fb4389329a0d69e614b6acb1bc05ad1d97bdbe4872b17540cfbf9cc8ed2e50b425610

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Purchase Ledger RemittanceSUP9935681.htm"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1148 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QQHCF25O.txt

    MD5

    f08f438372b6c6ef949cf376b0800e22

    SHA1

    a3fd98d001b7cf9089b4ae8e85a20259a828beeb

    SHA256

    7d6860073ac3df9a83e474816d7d88bdb4c47ec4cc17aaec10a1e68b495ac08d

    SHA512

    f0819888a004a5856e556aa6587ff1b316c790a314b46d4155bf1a9dd2f8cd17fee5f495d130d87bccb471ffb9e127550c1e1141cf11eb463ee6c0d03a9c94c7

  • memory/768-55-0x0000000000000000-mapping.dmp