Analysis

  • max time kernel
    94s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2022 16:36

General

  • Target

    sample.html

  • Size

    14KB

  • MD5

    ce97f93d0f38e4bfb31585091ecd6953

  • SHA1

    0cb0cd7ceab7531244a5c3b4a3ed1afb92822aeb

  • SHA256

    e9c469468bef11eed2988a317d4dfbb00007a73d86151f5447f65482223deec2

  • SHA512

    0b09fa731db782cb609d499b27a2e416abaac4510ab6a8aa8b5a01f7e397a417a117594f918736de93ef65b792c9de813f6ef6b8029a69ee43f7616bcc57e3b1

Malware Config

Signatures

  • Detected microsoft outlook phishing page
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1420 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1104

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    e42c88821eccb35056f66aff9c34b62c

    SHA1

    91a726e68ffa9442130149eaac72fbe195c4b8e0

    SHA256

    8f3bbcfa3e652966c5c3e78977f0ffba46a857bbf37300aee765d9d53f645c66

    SHA512

    49f35e0155da378b439b93846ca2436011516cd2bfb1049b5e85ae0e0054d6a1d4b5943f9141c9a93719d60c01b6dcba817a19580f14b60b66c8c4796debcf2c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lvx0ibj\imagestore.dat
    Filesize

    22KB

    MD5

    376901389179f94357fc8c3e92f3451b

    SHA1

    c7c34303ff29b68c894e799b9ab35a1b53e2bb78

    SHA256

    2daa7b08d2c2f635cc9486421ea101803963ec437edb5efb4b14e934d01865d0

    SHA512

    707e9e89b46eb6db71eb264e0b8535d0313056432399ac4f99a5df3614e1157484c4c3cabd4b627aa7da8f6815d177849fbddda184bf9dfe55841895543bae8f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\099AZ0UK.txt
    Filesize

    601B

    MD5

    8d2da1fc148923a406eba926e9bea61a

    SHA1

    c3ffd77d55bafadd3c6d97ff9811170ca0101511

    SHA256

    172710e99f410652faa2ecb0ff039c5994ce427619207bdf02197b9da42b82da

    SHA512

    409dfca142ad5bf766d795170d8459bfaccfd790fce3e6e457dfd809413e68cbe8fba2514904106104cb28b11c28ddf2ed30ec06f6f6e4dfaae5e31626bfd07b