Analysis

  • max time kernel
    131s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2022 02:29

General

  • Target

    dx.html

  • Size

    46KB

  • MD5

    5424efe0c4fbe8459b79c32b06464187

  • SHA1

    574c747760400e4d6588cc27f710736df788ddc2

  • SHA256

    7ff387c4e829703a5072a07181708bdd6f18256eff36c96ebbae8c9e7527d25d

  • SHA512

    87aa6433418ec3f55095a89ae6edd61a930f1c49ae9bf655bbb1408edbd2c072428e5f1a305d9af38c644c677738a33e50ee4c691715290f04fd2346aa95fbfd

  • SSDEEP

    768:RhBjVs6/L1hmsmTJh5Gs499JQswtICapQjQeTSP19kDSfrtBQSfMMvXtt9rScas9:RvjDphmsmTJh5Gs29JQswtICapQjQeTg

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dx.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1552 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7897c3bcccff7e288ce4bc5ae6569511

    SHA1

    c7615d599e641e48a61b7b2ec78da366bb13479a

    SHA256

    e182b8ad2f485a63dff6f84c3cce393ff28cd488cf913f78fcc1f34fd97fdda0

    SHA512

    c37fc859778f2a8fd072b2cc88c0ff3e55ed90b949410606572c6349c4aac1fd29146d559a7997348bc5847f3f4b41c10651c70fcc863e03efc4432bbcd916eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AKQQQUW7.txt

    Filesize

    603B

    MD5

    299928574e51db385d0a3a62c8407130

    SHA1

    71839b473bc659d9f5233caea22f41725a2ecd86

    SHA256

    6c4bd2cd2a8f93a52e71635f1896440bb586ac89a73be5cc7404b755153cb3d6

    SHA512

    a0f2378120aadcca2de89db4ece62f5a80bb97adb8cc234441ce5a197af4c3a9f3e7038d6bd0c7b964685509b83687ca8f33183ed3fc0443de40810c846c6ec4