Analysis

  • max time kernel
    107s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-06-2022 19:45

General

  • Target

    files/Me.html

  • Size

    2KB

  • MD5

    cc64f2b1be564864ef54387123cff924

  • SHA1

    e8eb443e51f40569bf70ccd561bced5aa0f424e1

  • SHA256

    47561dcf8de30f82a5e749bafc875d3703fd6c7f7d0930e42ef58888b06b1a11

  • SHA512

    8af809fc1bd82abcf60778779d4c8f5d5d900fbdde5c4af9a4b94ee013790e15144977524d8f5435dfa968d04e8aa1ac2bd529104cdcf284edf25c512f7ab859

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\files\Me.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:840

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YZOQL7DJ.txt
    Filesize

    604B

    MD5

    8905ccdb451b8d70410e9a8bb2c3f0af

    SHA1

    60433508559b47248f143c29e1bed1eb19b41394

    SHA256

    ce7e3ca75f0e4f26f4f8dabff1d9dc184ff04e68af34c60452356c45a14859b3

    SHA512

    860ec2573193222c04d6cf5f4c172519eaa30ddcc40d2c7b2e0b484b6d52687d89944cd66e8867011e2253e53d5dd26321ceb0f42602dac564dba60f419b4b37