Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2022 03:01

General

  • Target

    jetbra/?????????????????.html

  • Size

    367B

  • MD5

    d400de475a63d3460710008e4765d621

  • SHA1

    f738e1f0208d29cfbb26b2dcc9d29df71274fbd5

  • SHA256

    eea6292e6d86c4fe93b03a9d88caae9fbf277ead426187ba72ae92d25770c10a

  • SHA512

    e5ef1efa1cd82992be90d82722249aee83eea8e08d5555459cd3a53f98575298739f8723690311603993ab53d3ca041a4aea0b64a1b1a9c9ad8b038a44adb3e1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\jetbra\_________________.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:624

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    d7f3c23efae94648a3fb73888c1ec0c3

    SHA1

    12e89ab02ee1b9254ecfa6e16648715265a58195

    SHA256

    4acddf73dab3bac5eafb3ff11eac7ad6e31171535df24cc00312f0ce62002b00

    SHA512

    98b0632b581371a735f6017e9cddcd4105b55a6fa2f27a55877aa4931b00a7837d3352dc22a041108132e5eb76640b61d36a16e0eec324afa6c700fadda5ce50

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat
    Filesize

    7KB

    MD5

    b477e5e1c622317970d345ee0e4e4482

    SHA1

    99d1db205c5186face483e4904bf5aefa40230a2

    SHA256

    0e6ecf3fca6a74b603f6fff1058dc380f19890351ca22521374b62a248d4ccd9

    SHA512

    32e14519aa88e0a380cda21ace8c23a3e2ab8d3453622f64256f3026774073eafcc8ce6e7e82af03c09db6404be642144841873f5842f20cb57c540acb6d653a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Z4565EC5.txt
    Filesize

    608B

    MD5

    8fc587cfac21eea445130afea47ea4bd

    SHA1

    74143f485a719224b9fd8c6679da51eeda0f67c9

    SHA256

    3fc6781ad34dce9a2bb312312f7e84d75de363e908bdb0a48d17d8b2622fecca

    SHA512

    7375a98df63a9e71ba0ac3e41c3495e0ae998539a30d3f39b11a2f7f4f7528f23c88807caf4fcfa2b7eaf0e612d2eabd787bede606c8dcbe3ca8eeac62bc5b4a