Analysis

  • max time kernel
    77s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2022 02:29

General

  • Target

    dx.html

  • Size

    2KB

  • MD5

    b49f19d2ba6cd58ba62fd4b392cda745

  • SHA1

    8b452cc5d3dd9001448591484f1f77d4f055c581

  • SHA256

    c043e2c9aa5e870b27cda141341fe229de1bb3f30c64b6ddd71bb5d6beb9f2bd

  • SHA512

    535246e6b0ea3d3b5eda9250728f2e802546219ce4b941b51c1d9c9e63d3eee930b66a0b1b93e8c9874e53f5aa7b6f4513ca6debc8762b7f3a7b82e25d7d0463

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dx.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1424

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    50f00598360814747b0f275ad809c589

    SHA1

    fd3856fd3e2abc834d61dc0addd5f9aaffb5cc8d

    SHA256

    21f60f73c4614b13b11ace394d40687efb96c310518cfa8e10fcae8f5b974513

    SHA512

    31a65666b0c92b3ed1f5a082b54a9ba3c8b246b18e24a248ea1b6c949102f7a593921d4dbef727cc05f502dfd80cbdb20c535511f0e6c57bf9cdd3b61b180fb1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\N09LFNLZ.txt

    Filesize

    608B

    MD5

    a4117ce842f59d8af0fe562b0ce1fdeb

    SHA1

    337491281fd165e66e127f9ad517dd1a243b684d

    SHA256

    dc34a5a5af903b4b8a7395437285a5695ddc10f5e12c3fb66965468edf7a9a7f

    SHA512

    fd984ef4e7e194bd1e2c55617d4e5976de67b8aa168e8ece9ba358612ab0b80c198871741aca804ba013ee239b1c80fdac4533d542d05c06f1da05700a0ae1e4