Resubmissions

14/09/2022, 13:40

220914-qyxy9aaea6 1

14/09/2022, 13:31

220914-qss34seben 1

Analysis

  • max time kernel
    73s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2022, 13:40

General

  • Target

    DHL Shipping Document.html

  • Size

    4KB

  • MD5

    ca45329f00252d30fbfa78fc960ae88e

  • SHA1

    59d578b157788b36fe5aa521ba5ffbcb19db551e

  • SHA256

    6b0528d8567a9ea0b6359c137e95fcb97379c69e4a9547dc1dca29a8f0ecafd5

  • SHA512

    1cb1f20721f8cc0eefec83ae50aa1833dd4a0f45d8119170c149e1b9125f033a55dcaebc42f8994d940b3fa3ffc22c94849054b3836c7bb2f7ea328c85fc7e74

  • SSDEEP

    96:jM4Ei23t936bkWAZVuCrCPwgTwyjAN72FOvJXkfEJW++bc0S1i1xYBMNI3:gHtZDruCrCPTk2YvJXkfEU++bc0ki1xa

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\DHL Shipping Document.html"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6JJ3J3SL.txt

    Filesize

    608B

    MD5

    38772392a1785fecea00c39916d118a5

    SHA1

    fcbfed9560cee3aab433f96384122dca068a8e11

    SHA256

    8fa13c27a7bb3f850fa9257a49ef46b3d254066f473f472fe6a14f4e5a5099ba

    SHA512

    156acd7dca4edf375fc2ad233d63a7e11fa559fb4be7468219d07b7b264f4effaf16b591f81c7e52dade267e8c4114fa528b856e4267a63ba990524eb350f3d4