Analysis

  • max time kernel
    119s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    12-11-2021 15:36

General

  • Target

    🖨INV_6204216.htm

  • Size

    710KB

  • MD5

    e517651acf63b6b1e684eee92c473eee

  • SHA1

    de8b7cce62a64e01c154bd0dd579ac3c39914f6d

  • SHA256

    2715f779e8e67f04a8de49e5a0f29b667cec8a614cb03a24a9c6cac6e9d88505

  • SHA512

    4061217a53241c73f913edbae16135b3b1d290865b0e77e797d3d4b6c985187a8491cd3392e75034db8397970263fc8662140b066efd0fbc97985a197c0c7cc4

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\🖨INV_6204216.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1864

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    acaeda60c79c6bcac925eeb3653f45e0

    SHA1

    2aaae490bcdaccc6172240ff1697753b37ac5578

    SHA256

    6b0ceccf0103afd89844761417c1d23acc41f8aebf3b7230765209b61eee5658

    SHA512

    feaa6e7ed7dda1583739b3e531ab5c562a222ee6ecd042690ae7dcff966717c6e968469a7797265a11f6e899479ae0f3031e8cf5bebe1492d5205e9c59690900

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    97ed8c0b4b8315676d9a0d5e430af549

    SHA1

    ab66b93d8b3dde5db713ab548d8e8c8e94a40545

    SHA256

    02160fa9bc46e2a3c5eda74b2941476592824febe0983b7683d78b9a1b537233

    SHA512

    520a7fe26382ccb11a6f369101f3d8bd1187b1de737cb2a44f2cd6d9611054c98721c78908e7a95dc97960e729bc5808681e30680b68db721c810d6ccfad8b14

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IQNE5WF9.txt
    MD5

    c86ba7d4ab08de8cafca217b24f0ffef

    SHA1

    bec34bc1b7d08d3ac029dceaa846c4222a416387

    SHA256

    c52cfb2826c74305af81b0b4ba1a8279f4a377e6714857c96bf4f014e495011f

    SHA512

    41c3b948d255c7bd4bf2a6fdd66ad5c56a263302626cc4f140c6b534791e318295923b5f3def40f0b802cd37d208b540b22f9cba04770ecebccc49a9afcf80f9

  • memory/1700-55-0x000007FEFBD61000-0x000007FEFBD63000-memory.dmp
    Filesize

    8KB

  • memory/1864-56-0x0000000000000000-mapping.dmp