Analysis

  • max time kernel
    68s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2022, 12:35

General

  • Target

    Invoice_S100464130.001_PO__22-4037.html

  • Size

    744KB

  • MD5

    20492986a7ed42de81881176a2274795

  • SHA1

    303adbb9ba528cd02c047fee84b09847aa07be5c

  • SHA256

    a38127e849200b2e2a18eac7234a32dfb088548b34d58e59005240722f6059fb

  • SHA512

    7b46ad813fbb7188cc70c537804783cd01bce02ad30e824dd774b761aed3b2b1b1945c00ee6daef16450fd3a0458996bb916650dce8aec86a825d8f3e6532189

  • SSDEEP

    12288:cGyDYQgwWIo9nV7SQXXPHgwT4W+oOhCmQIT:dyDYQtmnVWMXPHgwT4W+5CmQIT

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Invoice_S100464130.001_PO__22-4037.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:768

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          60KB

          MD5

          6c6a24456559f305308cb1fb6c5486b3

          SHA1

          3273ac27d78572f16c3316732b9756ebc22cb6ed

          SHA256

          efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

          SHA512

          587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ee2e291d6dfc71689dc04e49b92ccce3

          SHA1

          553de5a855dcf1967e75851310648909fec32d0a

          SHA256

          f11ede618c4b8d6cd9b167a598b28f2971d23b3f8c9a4a68194156b4203f1bd1

          SHA512

          60186a70cc1eb8d5b61cb1f05ad1f3a179911608733af4c1a2c45611de82974a423210cbf5a26131fdd6b1d75c56410e82918071f880fcbab1751e9724b13acc

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7DXLK5Q0.txt

          Filesize

          606B

          MD5

          5ef4bd24b344799405a0df2b2b14e7e6

          SHA1

          c3687aa2da2653e51c2f21aeee3da23ebbc660a0

          SHA256

          1e3fdb66c5d06a17be4c1a202d7170e69eb6c3407b2821e8210a0bc0e7d3068d

          SHA512

          b142c93731a1739620a934a795fa566208a930ada4aa9e1517200fe69a29eeb0fed8b3c7060d05a436afe191d27f19fb09b6cfea68f2d5c91c7bbf79c05708c2