Analysis

  • max time kernel
    87s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 20:17

General

  • Target

    f045592284747c6075e70ba621e0b08dcac3e58f6abadc4b240397a773a78324.html

  • Size

    1KB

  • MD5

    4ff92d57a2e459f68465cabd85f0488c

  • SHA1

    d8de37ba8f835a4ea61dcb1559e3191426ffbfed

  • SHA256

    f045592284747c6075e70ba621e0b08dcac3e58f6abadc4b240397a773a78324

  • SHA512

    77b2f5ec4716eae00039135626aed6b8680a3bb597a53f724a7024595805dc183cd5e6970c91be79c56c40bece80531b3a9d18d33df91f66d92162703feb825f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f045592284747c6075e70ba621e0b08dcac3e58f6abadc4b240397a773a78324.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1436 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:940

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    308336e7f515478969b24c13ded11ede

    SHA1

    8fb0cf42b77dbbef224a1e5fc38abc2486320775

    SHA256

    889b832323726a9f10ad03f85562048fdcfe20c9ff6f9d37412cf477b4e92ff9

    SHA512

    61ad97228cd6c3909ef3ac5e4940199971f293bdd0d5eb7916e60469573a44b6287c0fa1e0b6c1389df35eb6c9a7d2a61fdb318d4a886a3821ef5a9dab3ac24f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    3a0bf3dbc8f3201439329fd86e84e2be

    SHA1

    3f663d1815d6ad07f010f2721172dd4e3c38da4d

    SHA256

    fad18606affeda41b39957e4850a4f6df1acf5fd6743f60226931128558ac80c

    SHA512

    39308b69fa5802f6bbf9e579301cdf04f4963eabcf2ecb990ca42b27fbad7aa4926c16029b096c0ba15f10cebbce385d34935d52d9d8629e99e83ee91ae799d8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1LTTI23R.txt
    Filesize

    599B

    MD5

    dafb12f151998fbeb090851647ec1d25

    SHA1

    7c3a21e230e77d0046dd9a0468add149cf43be9a

    SHA256

    65cbb44ce440ed11eae4d2d04e0001536ecb3da91b1dc616f5df7f5e7adfa3fd

    SHA512

    83dfecc4f2132a0ec781acc2ef747815f3822e032c8491f01df5ff296bfae82e7dd439c732e54409bbc9fa4c80e62b87e7ac4b587822149a44d5c6ee04fc767a