Analysis

  • max time kernel
    67s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2022 16:42

General

  • Target

    Payment Schedule-PL-PG-1693507.file.html

  • Size

    6KB

  • MD5

    f581aaeff4b8396cf7c965df6579cee4

  • SHA1

    8c1df650d31c2dbde202bd2df6805074f15cf977

  • SHA256

    ad862528e36df357f1cb2446ddb86e31c63fff12fd2d030f0aab849d2535e685

  • SHA512

    90c0a4a0361e113a08bb7363c978bbf136b0f439ce3f1e4a26216cda43c0cebc235baca80a2a2f8b0a56a3c526dde5ae9aef5755179d51a591b48ea7789c965e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Payment Schedule-PL-PG-1693507.file.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2036

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    71ccbbfc2b680f426750131c648c0ca1

    SHA1

    dc9ac41d5909173922bd3e9c5f0c659b20d1312b

    SHA256

    fe332aa9d3e45d656f84d99547090ef5aaa62afc48ee89596d5f557fd3a0f357

    SHA512

    446a75a5139a97fb1b7dfa385b019d4f52b5ff7758cdfb1f4049b89f400e8967e3a20186079d59c3cd72fa991805c87337e63f2050a4f3e9a2e791ccf237beab

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WQ7LW93V.txt
    Filesize

    601B

    MD5

    3842d17656371719bf7664ca267822d4

    SHA1

    08c06e80f627f49fcab1ba0b37ef8761804d3a60

    SHA256

    8947ecb05bc68999c4e4db4c8e91af07dcce372c3f8b9c5d56eeff7b28e8e09c

    SHA512

    8723480d26a113483498cebd701c1c7ec2efd7b360d4a5733554cc6f85d9d34395ede974c871de29b2feb4df45f7dad0ada4f6437b78c8eac95b799f088374d4