Analysis

  • max time kernel
    96s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    13-07-2022 14:14

General

  • Target

    jpkv7m2.html

  • Size

    315B

  • MD5

    a34ac19f4afae63adc5d2f7bc970c07f

  • SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

  • SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

  • SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\jpkv7m2.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:388
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:388 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1712
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:968
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x188
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1740

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7d7f347f3dd9ba4428efe9ef632ccce3

      SHA1

      346c3bf26ed1b6db386a525481cca46de5fd59ff

      SHA256

      98d29fae4fc217a6772e86b36a3f7321b74484d064ac6f603e46fecb0789e408

      SHA512

      aab7775c71143e620c40606a6dc6e78222488fe6165b4ed9c9430358fbc0e79d6d84d9c4b0c132889e29c95d4f89d87b5873d2c16a54b69c79ce2b1b014c97f5

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JWN1LBRE.txt

      Filesize

      601B

      MD5

      bbc55a4060c729a1c0f4c73e64efba86

      SHA1

      ec6d3ebfbbdc213064c75781ad683ed8df426321

      SHA256

      e104f5bbe0f27339f64dc19e2a7018dfeb4df7c77cdf29661f4c824efd23e920

      SHA512

      505ef39976debe939c94aced61516499b6850229fd822f39b97bfb8df3432e8a691f580c522b71dec858280a10462af9b23c280c596e8ab7311bb7a315d09edc

    • memory/968-54-0x000007FEFC451000-0x000007FEFC453000-memory.dmp

      Filesize

      8KB