Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    23-05-2022 21:06

General

  • Target

    Contact-Customer_Care_1973-Helpline/ENJdfdfdDEfMnifd00iE888Error8/index.html

  • Size

    40KB

  • MD5

    5c6b0147dfff4bf2a52fb6a221396452

  • SHA1

    9bef33d6f6b291b29452dfddc8296d205ace2b7d

  • SHA256

    9a8f57e19a0f8809dde17ef711bffead3e2f2d1712fa11b5810fec6bc05a96a6

  • SHA512

    2d8f84b50ee7dbac1e1e26dfcf030b38d7df1717608464959fb0fac196c7c04763ad9fa5b00d89bcd55025632d2c8ee820cec4ee7d80c21bf651084b3a8ec403

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Contact-Customer_Care_1973-Helpline\ENJdfdfdDEfMnifd00iE888Error8\index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1700
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x27c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    b9f21d8db36e88831e5352bb82c438b3

    SHA1

    4a3c330954f9f65a2f5fd7e55800e46ce228a3e2

    SHA256

    998e0209690a48ed33b79af30fc13851e3e3416bed97e3679b6030c10cab361e

    SHA512

    d4a2ac7c14227fbaf8b532398fb69053f0a0d913273f6917027c8cadbba80113fdbec20c2a7eb31b7bb57c99f9fdeccf8576be5f39346d8b564fc72fb1699476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f47c1110208edff6fc922ae39ddd2c98

    SHA1

    03e9a04c0a28e50629d26cdcb19641fdf4aed2cf

    SHA256

    c512f53be0ac3ce22c20efdb3aeda1824ad0c2545e25791022a8a1e3d186c93f

    SHA512

    af48469d14cb08d1f1f55f32e7b4e74931d53f332a48908e0b4850c836f98331d6898cc8ec74e93092120f9cb8c81a79ca1a0875e1d5b1387e50e454db85c5d8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CNQM331E.txt

    Filesize

    605B

    MD5

    c0d5deddaa170ff5c15cb962cc854272

    SHA1

    f5724bf74f254f83ef8fb4c537a97410452f95d6

    SHA256

    96f52b5ae499b9454d7ef73d9a83bb5d608de76839adf226c7a6a87f446ca683

    SHA512

    3555ba818affd168c5ba4c68609051023ce1c716990cf444547b3adf9165cc37d89170fc0fce1fba7e168ad2c830ede582ac05e27d7ff5ad642ba4f0972d6f69