Analysis

  • max time kernel
    87s
  • max time network
    182s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2022 18:43

General

  • Target

    REMlTTANCE_CPC001.html

  • Size

    401KB

  • MD5

    7b37d6c25c5cbca1e04acd15adb33bdc

  • SHA1

    18d0041d6404580a3cd611c19ef590bd68def4d3

  • SHA256

    33dbe3bcfb764a82b6a31c3d5d31037f7a205fb074c366abb40f38c0f8f071bc

  • SHA512

    e376709a840892d539e8b8a1781ed8dc91a743d13b4536d937af6fd72bbcd1099ef693caaee2aca980b852cbf9f181eae30611b4a0affc8e98b052a8442e1c4d

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\REMlTTANCE_CPC001.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1052 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:960

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    92c13df28f48c98ec08f082a222ab85f

    SHA1

    3fa35039beaa242193d8aad8ee5c70e99fbf43fd

    SHA256

    afdb696d125dbc8dbf4df3ed42c179c4927b27452997c15f484c49ef1707083d

    SHA512

    72b3d5e10b1bce25f910bd8a1151741eb1590b1af962fac4276d744eb65c48a9fd3560ea9eb0535efbdf553660c99c267214d433de467544bafb3c664652b290

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EG2GXT1C.txt
    Filesize

    607B

    MD5

    a2bdb1074442314756961c01aff956d8

    SHA1

    1a347ca965953b7dde32d64dbc63c3f11b72345a

    SHA256

    28a1bebd9be22307a733dcad3cac5c8952dcc9597f04db2282796036abd2784b

    SHA512

    452029a63c332fb591ced3c976c238f4c0c4644c9ec515f86f9a1714a1204f457901a0a663c9586c5578a5c6b9320b3b81f31b9ac22713e5d031f04b9f48e5e0