Analysis

  • max time kernel
    102s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 11:06

General

  • Target

    507323832b3594c8fed262dbe6a04c794b939b38ae6d10bfb6053181b3e3cc24.html

  • Size

    9KB

  • MD5

    fc4f3a428b494b1dfb74085d3635a91d

  • SHA1

    09d96bb21dd628c24c45b7fc8055cfdb3e5e6669

  • SHA256

    507323832b3594c8fed262dbe6a04c794b939b38ae6d10bfb6053181b3e3cc24

  • SHA512

    d1bd9528b2b659fd575de336dd41010cf4c669fa717f0b4ed1346ea8d9a4de2304e03b0d71ce156e48c89ae9420ad51f2868992c0ba519f3e181294b3f418e90

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Detected potential entity reuse from brand paypal.
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\507323832b3594c8fed262dbe6a04c794b939b38ae6d10bfb6053181b3e3cc24.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:2
      2⤵
      • Enumerates connected drives
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1356

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    b9f21d8db36e88831e5352bb82c438b3

    SHA1

    4a3c330954f9f65a2f5fd7e55800e46ce228a3e2

    SHA256

    998e0209690a48ed33b79af30fc13851e3e3416bed97e3679b6030c10cab361e

    SHA512

    d4a2ac7c14227fbaf8b532398fb69053f0a0d913273f6917027c8cadbba80113fdbec20c2a7eb31b7bb57c99f9fdeccf8576be5f39346d8b564fc72fb1699476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    fd67f57e222d72a7b44251db3bf0c860

    SHA1

    88df32c62c1fcfcef14bea96ecf6eb63e5e39585

    SHA256

    65a741df39c749665828f23ef9d42d46309fc28472db7a9f7760da8d402989ab

    SHA512

    b7f222c4af8bb8f8ff9f8c43fa39d227277b1f38c159599fea6a1b62636319ad5c1151273aa0f2a30b6ed661ea238d24277de9ebda2b52a96a442e95bb3bacec

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.dat
    Filesize

    9KB

    MD5

    0dc44b3c977d39c5cb2815cf9ed60618

    SHA1

    534cba1a9d05a4a7850b8a09bde29fa22a9fa0a8

    SHA256

    f08fc967fb223c81d8f62b58cea54ad0e1ea67c2ee4707ce14ab6b5ad422b7ff

    SHA512

    893712699978a1f2b68158b65b2d93f4536b12f875f9bcc653d86d8b901a6a4411553d7f1a9d8ff77f44795195dfe343c5167032b1201aa747ef7ba10498f933

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QSKQ67RY.txt
    Filesize

    594B

    MD5

    a7fb0c47b831416de3855cc7f4bf148b

    SHA1

    37e570883fcf8af27551b9f216976f73b9018d57

    SHA256

    87a0bc4ad61447971ae6743a337ae9f50d3866b574e79d9a77f393c046568542

    SHA512

    035b49858cee470b7e60baf9c27146e640a293f149df36c7711c7812ea3a7e28d5ecb2aa30242b91467ab0e6ced08c2e79e4f37b4b7a91f157793ac7c82bf9ef