Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-08-2022 16:42

General

  • Target

    Payment Schedule-PL-PG-1693507.file.html

  • Size

    6KB

  • MD5

    f581aaeff4b8396cf7c965df6579cee4

  • SHA1

    8c1df650d31c2dbde202bd2df6805074f15cf977

  • SHA256

    ad862528e36df357f1cb2446ddb86e31c63fff12fd2d030f0aab849d2535e685

  • SHA512

    90c0a4a0361e113a08bb7363c978bbf136b0f439ce3f1e4a26216cda43c0cebc235baca80a2a2f8b0a56a3c526dde5ae9aef5755179d51a591b48ea7789c965e

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Payment Schedule-PL-PG-1693507.file.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2652

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\37zaxn3\imagestore.dat
    Filesize

    18KB

    MD5

    396c9a6f1ae7b38c98288b41e3206bcb

    SHA1

    048cc4790cd479f302ebd69487438d9b319add28

    SHA256

    b523db659a3afd0616c110e1d07afdd2d8b0129c2c130471b58d2dd26e7099c4

    SHA512

    c1b8838740a4df4340ca1a6bd80bbc742b55fe87eb8ed917842f19a1bddf43f342b55883ef9cb0aee4e77267de69883d21854a8ca472f3e0fad4e50179d16f07