Analysis

  • max time kernel
    67s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2022 07:12

General

  • Target

    attachment20220806-3715-1mubcjk.html

  • Size

    1.1MB

  • MD5

    337e45102a47c376dbe0c96319c1b64d

  • SHA1

    844b820ea60c3611ffef871b05632f8993dd460b

  • SHA256

    1e1c7387c2735feb16903b1c721b9c3df4b6e5bdd9475a21a0ae244546e4ac25

  • SHA512

    2f9a73c397e7eaaba537a9f7bcf343afcc486bc1285f4eb6f6ce9688b826c6cc3abd9d25ccb462c516075b8f9e4bdbe8644b8d5498634cf4b4baec1e09a616bc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\attachment20220806-3715-1mubcjk.html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    67b0fcf0ff806731d2d44f854841c9b3

    SHA1

    56d4cfa3736cb1ae126757731727960a8725cd1c

    SHA256

    598276837c29732917c10190d074d569925039178c943d2eb7b852685c20578a

    SHA512

    b11ed9addfc981906da0a1cd0bae80fa68000349935164d282a8ec2a4251f7f6c0ab91825f16d36a8c15f3d3b532949da5716b5228cf5b2bd87c03a43d9ba2fd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\L9TA5CNJ.txt

    Filesize

    607B

    MD5

    3e1ae372519c0fd4f8fdb00202dc6e60

    SHA1

    7668bcaa1dba0b0dacb4a5129bcb0cb44b921ffc

    SHA256

    9880950f1bbeff6d32ceee4a2ce7b01b400b13417165b6238fc05e811dc28687

    SHA512

    ea926db9baffdd106f0b84f92184624a94d7a6c7ee574462defec3ffeaeab62f447445cbe988a6af739ed1a21e0e32ba8ce4185ba377f87c1f1822d67b8b6747