Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2022, 14:51

General

  • Target

    http://HTTPS://couriermedia_us3_list-manage.storage.googleapis.com/AZ089F489G4089G4Z9G84Z09IUOPML.GQ6S804HG798QE4GH894EWLLLMMRRTT_1-00-00.HTM#v11SZFYx-2FWfmd5Xrp5aRoGfuxi3A4Qv0ocXsPLVyKvMHBlaoDHp83d6dvA8CV72j-2F1bFdG-2FiA8k67EHDOXyp1gUYxj2YSxQZq-2BXS3Is_HwyXKtf0IvOwLlqy1yc09EiAjKXsrvk1VNSVEKZSwvMGPL6esJZ8fGXBwoUi1z3Y-2BI4INwLtTvryNZsQ1WoZ3O4Nzospeo-2BtYo8l10Ois2dGCT6zhWyowhV4uq3LcCSZc4SCE-2BTKTLTvGijcuhK3RuUTtzQQ3e0AhrxOOfuejU8Eet0OQXyXkyVrn84qBhjYUlwTGHx8MxJAsAUHTJVxfdvpqRaYhBJ3q76Rddnc4Qcl4-2BTRSPfruW-2Bp06c1qK7PrySZ5WoN7tfg5Ijq8zSUqA-3D-3D

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://HTTPS://couriermedia_us3_list-manage.storage.googleapis.com/AZ089F489G4089G4Z9G84Z09IUOPML.GQ6S804HG798QE4GH894EWLLLMMRRTT_1-00-00.HTM#v11SZFYx-2FWfmd5Xrp5aRoGfuxi3A4Qv0ocXsPLVyKvMHBlaoDHp83d6dvA8CV72j-2F1bFdG-2FiA8k67EHDOXyp1gUYxj2YSxQZq-2BXS3Is_HwyXKtf0IvOwLlqy1yc09EiAjKXsrvk1VNSVEKZSwvMGPL6esJZ8fGXBwoUi1z3Y-2BI4INwLtTvryNZsQ1WoZ3O4Nzospeo-2BtYo8l10Ois2dGCT6zhWyowhV4uq3LcCSZc4SCE-2BTKTLTvGijcuhK3RuUTtzQQ3e0AhrxOOfuejU8Eet0OQXyXkyVrn84qBhjYUlwTGHx8MxJAsAUHTJVxfdvpqRaYhBJ3q76Rddnc4Qcl4-2BTRSPfruW-2Bp06c1qK7PrySZ5WoN7tfg5Ijq8zSUqA-3D-3D
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\H6GK0TT9.txt

    Filesize

    608B

    MD5

    d67a36c786420598addb5db0e0b11f5c

    SHA1

    a49da47ebd2169b82b16744e22bb1d2c5fe42788

    SHA256

    86aa058b47ab9e3ea356df5f7fab44b66689762603b03ebe3831ec60646da644

    SHA512

    8605e981955a7560af75e6d50c1b2f979b0bf92542f875be73ccdc91760cd9e53ccabc26c281afe01d39b26e3ad60ae05314783f6c7343f452df80bae7e1d629