Resubmissions

15-07-2022 09:27

220715-le15caace4 1

15-07-2022 09:08

220715-k3z2hsabg6 10

15-07-2022 09:05

220715-k1622sabf4 1

Analysis

  • max time kernel
    68s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15-07-2022 09:27

General

  • Target

    7c04f20104e661f361144cb549006e3fd7d3f960d0c410627bad2a795401a5f6.html

  • Size

    1.1MB

  • MD5

    6033e14dfeb0699ee4c1bd6b9c5ea95f

  • SHA1

    a5e5776da0391a064cbe823822956c0137cef76a

  • SHA256

    7c04f20104e661f361144cb549006e3fd7d3f960d0c410627bad2a795401a5f6

  • SHA512

    b2a5f6543eb830b675cdad7041d5529634ccdcf6ce8de89d98cd7cddb8adaeec56d6f9104d92808d276f2e86e7015a2918fecd8e28b41c5913e511637f264c6d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7c04f20104e661f361144cb549006e3fd7d3f960d0c410627bad2a795401a5f6.html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1088

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7a157fa6176c6312736538a703bb6eea

    SHA1

    1132bbfedffb3723e0e32cc7339bea00a7cd8d63

    SHA256

    ec37021dcbeb5bc1c8293fe04d36f9f024bf119a9a97ba68a6f31fc7de9c34a1

    SHA512

    e43ba0e0caa5f1216e71161293027d12eaca16e68462a1f374e615504098d6fe36ca75430719736a3989fa3dce5c98d4e9a00a030247aa4830c3f75b038a323e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QN73D04T.txt
    Filesize

    603B

    MD5

    feff8898ef57363ca69a7c5f761d2547

    SHA1

    25028791f9a210605eda994c62ff096d1d233c41

    SHA256

    4e9d34d72072b32551f339a87b7fa8e47b5186ca2e259d34fb19a8a988a45ee8

    SHA512

    9f440049da404b70f0a3d347527bd1206f8426113df447ecca2f741baddf43d480b8271d1f4b3bf90d7871f89801e7d8e6a66d1930ee1321b2646606dda8f2c2