Analysis

  • max time kernel
    71s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2022 18:37

General

  • Target

    V-Msg090.htm

  • Size

    465B

  • MD5

    48ef4483d15652bc547599b731de5d6f

  • SHA1

    d210aebbd1ef0105751c034993e055cbf282cc05

  • SHA256

    f174c68b154208b758b0ac5b00caebcc8bbe191ec113eccb82fd795344d15dec

  • SHA512

    2001f33b8e1864a31109a9e1c98a665e44427d359c9198fe7e06d31805df71cb192dad562d3c9af121fcf405ded277ee333ee18dc103d44b4d2eadf96f191d6b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\V-Msg090.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:848 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:728

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    c8b270952f5a31b30dd91813df83bf3b

    SHA1

    130ef7a99e16396c23e71dee4ee0a732eff2e2c5

    SHA256

    e9abf4fea8825490abaa7e5fc037660284905e3b5c4a5b97871a4cc7fa063572

    SHA512

    12f54cec5c1b21f6aff667462d588eb4b0b3d966fe143586693dbf0d65979158825c1d05d643d0549c2676e79264aca6939a527848d17ca0749df8cb1ab91b54

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\V44XIXEL.txt
    Filesize

    596B

    MD5

    36b561644a2b7d311caa9c770f2fb7d4

    SHA1

    ac30adaeeb6978768c14b379651e1a722c643ecd

    SHA256

    39f1ee1a21d4aa7a147b4e3329ef93736bdf9b9eb2bb405861861731d9093dfb

    SHA512

    cb70cdeaaa9941385e596f2eb664d7a4613fe00eda0620cf394e2f7126a114d43963182a7be002be1cafd80a2bc6f2c8f0464ec5268861386c07367b14d2b99d