Analysis

  • max time kernel
    344s
  • max time network
    346s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2022 18:48

General

  • Target

    Calculation#5887(Sep16).html

  • Size

    745KB

  • MD5

    888b441296e0a7347202001f9ddaf7ea

  • SHA1

    17aa01bd9cd18509660e5d6ffb5ac7d1d4b8c6ca

  • SHA256

    3194e29f73db80f32b9174fd1a7088ebef43017eb3f512af00eebc0e41b036a3

  • SHA512

    fb60ca1fa1b97ea96e5b371ebd204524527390c4c1b9a73bc7845c5f38525fc127f358281d0c182deeb96449df773228ee14ca27f13e9bfbe2d14539a411c258

  • SSDEEP

    12288:zLetYurAV7RQAbmkQEdgk4D5FU5fdj+ziXCj1FtsHT:/etY2AV9QAbm/qg38fdCziCTK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Calculation#5887(Sep16).html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:736 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    3cf85043022931cada600e52f43a25f9

    SHA1

    9a569301d29b40972da6ae9ed3dd2eb916b70b0e

    SHA256

    e88da9cff909549bc16fb26ef0e67090a5be6f60e5b4c1732bcb6425503a24ab

    SHA512

    845b0dc88b70de7d0bf566593f382219ab639e34e4803c8b367b67b6d3ac392005150068c3a73ab7a974cade4cede3c0146c6e25720af5a3a21a02ba447f06ab

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PGGK0VE8.txt

    Filesize

    608B

    MD5

    723dfd3820f65148860e178ff67734bb

    SHA1

    9878334ba555841c3be4c61e1eee39e611a93ebb

    SHA256

    6530a0a05a8e5a07b8fd9ddc225ec15c9b4ebd5242ef36a62ac14d195945547d

    SHA512

    e82d39034346a19885d984444f98e59f0e84c5ad07486a18a058db2d7d2772bf002923b4530edc4af5d80cc700736ad4e802ef0648fe4fd15315be700984d583