Analysis

  • max time kernel
    153s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-05-2022 21:16

General

  • Target

    002d6cd73be0b3d90ab3d83cc71452d9317500043455d5195874fe2fc2e5833e.html

  • Size

    82KB

  • MD5

    61167dc68fc29f9698f02ad296db5c58

  • SHA1

    69d73b794125990291bf260d9461640d0fd62516

  • SHA256

    002d6cd73be0b3d90ab3d83cc71452d9317500043455d5195874fe2fc2e5833e

  • SHA512

    228551523c2ba23a5d619f9dc290baa65d4964122124dcb61951863d217561600b08a3cf55df241f8cf32298aa637354009747e41ab0f1c17616f620b6f66a9a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\002d6cd73be0b3d90ab3d83cc71452d9317500043455d5195874fe2fc2e5833e.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1212

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1caef47cc9f353f5d35497f744421ff0

    SHA1

    6f589c36a28261f1ea29a2fd4df44ebcb9ff5253

    SHA256

    3827125af7e706ca01ca1ac4a8c6a5f6243cb6902fd66637eeab88a6d71d4b47

    SHA512

    492f542d6befae3ee08831abcbc5df8a205c0431ccf61895ff50339e981ef161c19e6587be290045bd02e1d66b359a5ca9f77548718ed62668029ff649f1322e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3WT7GB8S.txt
    Filesize

    591B

    MD5

    e26a0412c611b2a0afb572fce1d6fcfb

    SHA1

    b1d1a0f7c69362c6f9a150bc370b0f9d606cfaa9

    SHA256

    1f2825517940a57fabcaa820dc35644c8e9ee179303c519464609495f63398a0

    SHA512

    8f2ab5dc5620c63bc987ff010276eb1cb33c31c9c097969503d686957ec48aef6c21fbdc4b952b114d332cdbea0939a34ad52201dfe0fa1cc7b3ee97bc14ab0e