Analysis

  • max time kernel
    116s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2022 07:36

General

  • Target

    attachment20220806-6895-6g7ijn.html

  • Size

    1.1MB

  • MD5

    337e45102a47c376dbe0c96319c1b64d

  • SHA1

    844b820ea60c3611ffef871b05632f8993dd460b

  • SHA256

    1e1c7387c2735feb16903b1c721b9c3df4b6e5bdd9475a21a0ae244546e4ac25

  • SHA512

    2f9a73c397e7eaaba537a9f7bcf343afcc486bc1285f4eb6f6ce9688b826c6cc3abd9d25ccb462c516075b8f9e4bdbe8644b8d5498634cf4b4baec1e09a616bc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\attachment20220806-6895-6g7ijn.html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1224 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    71962f8603bac85a6955f52c9dc6d25c

    SHA1

    5d245a9a50df325a4344fe29a3e8e98435639011

    SHA256

    3e3366a070b2a7f1c42d969adb19318e1935bd54d34160270d6ef2035656500a

    SHA512

    586eb6506799a3b6166390eef542138c0dc97b226485ba9efc73ed49531b8d983afa2f0004211398d1c2970ffbf162fda53a0c49f4f1ce44e0054f6b1d6cedfe

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\K1LPJ7F8.txt

    Filesize

    603B

    MD5

    83e957035744983a33c39f34695ec654

    SHA1

    1f50a1e936c1db821c1c21465bf9b91a26dc5003

    SHA256

    2a7521f4e52102fe7f2812b891b9cd420a1761ad8116ae236a43f0362b2729ea

    SHA512

    40386bf6c22d0fdbb3236c4777c94a2e9d551365213ccc9f7ed504bf7f24604ff51824161b76d863369c89bcad2972d6960a65f5e96b65e749619da99c7f877d